Professional Documents
Culture Documents
Naval Postgraduate School: Systems Engineering Capstone Report
Naval Postgraduate School: Systems Engineering Capstone Report
POSTGRADUATE
SCHOOL
MONTEREY, CALIFORNIA
SYSTEMS ENGINEERING
CAPSTONE REPORT
by
June 2018
i
THIS PAGE INTENTIONALLY LEFT BLANK
ii
Approved for public release. Distribution is unlimited.
and
from the
Reviewed by:
Paul T. Beery Michael P. Atkinson
Project Advisor Project Advisor
Accepted by:
Peter J. Denning
Chair, Department of Computer Science
iii
THIS PAGE INTENTIONALLY LEFT BLANK
iv
ABSTRACT
v
THIS PAGE INTENTIONALLY LEFT BLANK
vi
TABLE OF CONTENTS
I. INTRODUCTION..................................................................................................1
A. BACKGROUND ........................................................................................1
B. TASKING STATEMENT .........................................................................2
C. PROBLEM STATEMENT .......................................................................3
D. OBJECTIVE ..............................................................................................4
E. OUTLINE ...................................................................................................4
viii
B. RECOMMENDATIONS .......................................................................119
C. AREAS OF FURTHER RESEARCH..................................................121
x
LIST OF FIGURES
Figure 3. Projected Operating Area. Adapted from Google Maps (2018). ...............17
Figure 9. MOE #1: Friendly Force Overall Survivability Regression Model ...........89
Figure 14. MOE #2: Enemy Force Survivability Regression Model ..........................94
xi
Figure 18. MOE #3: Operational Impact of Statistically Significant Factors—
Enemy Missile Ability to Find the Assigned Friendly Force Asset ..........99
Figure 26. AIS Tracks in the Prescribed Area of Operations. Source: Marine
Vessel Traffic (2018). ..............................................................................129
xii
LIST OF TABLES
Table 25. Ranking of the Significant Factors for Fixed and Variable Force
Structures .................................................................................................115
xiv
LIST OF ACRONYMS AND ABBREVIATIONS
xv
EMCON Emissions Control
ESG Expeditionary Strike Group
ESM Electronic Support Measures
ESSM Evolved Sea Sparrow Missile
EW Electronic Warfare
F2T2EA Find, Fix, Track, Target, Engage, Assess
FTE Find, Target, Engage
GPS Global Positioning System
HARM High Speed Anti-Radiation Missile
ICOM Inputs, Control, Outputs, Mechanisms
IR Infrared
ISR Intelligence, Surveillance, Reconnaissance
JCA Joint Campaign Analysis
JCS Joint Chiefs of Staff
LCS Littoral Combat Ship
LHA/LHD Amphibious Assault Ship
LPD Landing Platform Dock
LRASM Long Range Anti-Ship Missile
MANPAD Man Portable Air Defense
MDUSV Medium Displacement Unmanned Surface Vessel
MOE Measure of Effectiveness
MOP Measure of Performance
MST Maritime Strike Tomahawk
NMI Nautical Miles
NOB Nearly Orthogonal Balanced
NPS Naval Postgraduate School
NWDC Naval Warfare Development Command
OOB Order of Battle
OPNAV Office of the Chief of Naval Operations
PACOM Pacific Command
xvi
PLAAF People’s Liberation Army Air Force
PLAN People’s Liberation Army Navy
PRC People’s Republic of China
SCS South China Sea
SAG Surface Action Group
SAM Surface to Air Missile
SEA Systems Engineering Analysis
SM Standard Missile
TERN Tactical Exploited Reconnaissance Node
UAV Unmanned Aerial Vehicle
VLRAAM Very Long Range Air to Air Missile
xvii
THIS PAGE INTENTIONALLY LEFT BLANK
xviii
EXECUTIVE SUMMARY
In order for the team to develop a system of systems that contributes to the ability
to perform Distributed Maritime Operations, the construct for DMO requires bounding and
defining in further detail. For the scope of this Capstone project, DMO is considered as an
employment concept in which multi-domain platforms and technologies are integrated and
leveraged with the objective of increasing overall lethality, while also decreasing
xix
susceptibility to attack from an adversary. A system of systems that performs DMO is
capable of projecting offensive firepower and executing collective defense over a large
geographical area from a unified set of naval forces across all operating domains. The
primary principle that separates DMO as an innovative concept from current naval force
operations is the empowering of operators and commanders to exploit available
technologies and take offensive action in an engagement when capable, to strike first in an
effort to win in combat against a capable adversary.
The DMO concept considers not only offensive strikes as the primary tactic for
winning in battle, but also identifies the ability to deceive and confuse the enemy as a
critical task to achieve success in a contested environment. For this study, the employment
of DMO is decomposed into three primary functions; counter-measures, counter-targeting,
and counter-engagements. Each serves a different purpose with respect to an engagement
between opposing forces, and results in different intended outcomes. Counter-measures are
defensive in nature, as the aim is to divert enemy resources once a weapons engagement
from an enemy threat has occurred. The objective in employing counter-measures is to
distract or impair the enemy systems in an effort to protect against an enemy action that
has already occurred. Conversely, counter-targeting assumes a more offensive stance
within the confines of an engagement between adversary forces. Counter-targeting is
considered as actions that are taken pre-emptively by friendly forces in an effort to prevent
an enemy weapon’s launch from being directed towards an actual blue force asset. This
counter-targeting objective can be achieved through the employment of deceptive tactics
and operational maneuvers that divert or prevent an enemy from targeting an independent
unit or group of friendly forces. The study’s final element of DMO is counter-engaging,
which describes actions taken by friendly forces to neutralize a threat to preclude any
potential weapons launch from an enemy platform. Each of the aforementioned principles
of DMO are considered in the project as a requisite function in order to contribute to the
ability to conduct distributed operations in a challenged maritime environment.
In order to analyze and evaluate the utility of various force architectures comprised
of multi-domain platforms, the team constructed an event-based model using a discrete
event simulation program called ExtendSim, to represent a fleet-on-fleet engagement
against a near peer adversary. The ExtendSim engagement simulation developed by the
SEA-27 team considers both friendly and enemy orders of battle in terms of the major
platforms, sensors, and weapons systems projected to be operational in the prescribed
2030-2035 timeframe. Additionally, the employment of the previously described tactics
are modeled in an effort to gain insights into the potential value of employing the deceptive
measures with respect to various survivability and lethality performance metrics.
The ExtendSim model data outputs and the application of multiple regression
analyses allows for the evaluation of both a baseline fixed force and variable force
structure. The baseline force structure consists of a fixed set of friendly force ships and
aircraft arranged into traditional action groups including a Carrier Strike Group,
Expeditionary Strike Group, Surface Action Group, and various independent deployable
units. The independent variables examined for the fixed force structure include the various
tactics such as the employment of jamming, quantities of available physical counter-
measures, EMCON assignments, and deployment of swarm assets. The variable DMO
force structure is comprised of any potential combination of surface, air, and unmanned
assets and the associated employable tactics and counter-measures. The input variables
considered for analysis of the variable force structure include both the tactics previously
described, as well as the variable quantities of platforms in the surface and air domains.
xxii
From the analysis of these 2 major categories of force structures, the team determines the
statistically significant factors or tactics and platforms that contribute to friendly force
mission success, as well as the operational impact of employing the various groupings of
platforms and the associated tactics and deceptive measures.
C. CONCLUSIONS
From the analysis of the fixed and variable force structures, several factors are
deemed statistically and operationally significant with respect to the ability for various
force compositions to perform DMO. With respect to friendly force survivability, the
employment of jamming and deceptive swarms demonstrate a larger impact on operational
effectiveness than any of the mechanical or physical counter-measures or any of the
EMCON techniques analyzed. The application of jamming against enemy threats serves to
disrupt the finding and targeting phases of the kill chain, resulting in a delay to find and/or
engage the assigned blue force asset. The time delay for the enemy threat in the targeting
phase results in an increased number of opportunities for the friendly forces to conduct
counter-engagements to neutralize or destroy the threat prior to a missile or weapons
engagement. Additionally, the presence of a swarm creates additional contacts and clutter
that require the enemy to dedicate additional time and resources in order to identify and
classify each of the swarm vehicles as hostile or friendly. Again, this delay imposed upon
the threat is advantageous to friendly forces in terms of conducting offensive strikes and
employing layered defense against an inbound threat.
The primary missile carrying surface platforms, specifically the cruisers and
destroyers, have the greatest statistical and operational impact when empowered to take an
offensive stance in an engagement scenario. The success of friendly forces with respect to
survivability and lethality is influenced by the significant contributions of the missile
carriers in terms of both offensive and defensive weapons, as well as the capability to
contribute to a common operating and fire control network. The missile carriers provide
long-range offensive strike capability and serve as the primary foundation for the collective
defense of the force across a large geographical area. Additionally, with respect to the
integration of unmanned assets, the missile carriers can serve as a parent platform for the
deployment and control of unmanned assets.
xxiii
The SEA-27 team provides these recommendations based on the analysis of the
statistical and operational significance of the factors that contribute to the ability to perform
DMO against a capable adversary. With respect to jamming, it is critical to not only
examine the methods of employing the application of electromagnetic radiation against an
adversary, but to also consider the ability to defend against a similar attack. With the heavy
reliance on networks to communicate and share a common operational picture, the
susceptibility to jamming must be mitigated to prevent being incapacitated due to the
inability to freely use the electromagnetic spectrum. Unmanned assets and technologies,
while modeled primarily as clutter in the engagement simulation, can serve as a significant
factor for the combat capabilities of friendly forces in terms of ISR capability as well as
increased lethality. The presence of armed unmanned assets changes the dynamics of a
battlespace, with the advantage given to the operators that are able to effectively employ
the multi-domain unmanned vehicles. Lastly, if the unmanned assets are able to
successfully emulate another vessel in the order of battle that is frequently targeted by
enemy threats, the aircraft carrier for example, all other friendly force platforms reap the
benefits of a reduction in being targeted and engaged by enemy threats.
xxiv
ACKNOWLEDGMENTS
The SEA-27 team sincerely thanks our advisors, Dr. Paul Beery and Dr. Michael
Atkinson, for their guidance and direction throughout the duration of the project. To say
that we couldn’t have completed the project without the dedication of their time and
support is truly an understatement. We also thank Captain Jeff Kline for his mentorship
and sage advice throughout our time at NPS: thank you for providing us the opportunity to
shine on camera and promote the Systems Engineering Analysis Curriculum in the SEA
promotional video!
The SEA 27 team also credits the faculty and professors of the Systems Engineering
and Operations Research departments with providing the requisite knowledge and
instruction needed to complete the capstone project. The ability for the lecturers to present
the necessary material from both the academic fields of study as well as from an operational
standpoint proved to be vital in our research and analysis. Thank you all for always being
available and keeping your doors open for questions and guidance.
xxv
THIS PAGE INTENTIONALLY LEFT BLANK
xxvi
I. INTRODUCTION
The United States Navy has conducted integrated maritime operations since its days
of inception nearly 250 years ago, thus the idea of ships and their associated aircraft
operating as unified groups is hardly a new concept. Force packages of surface combatants
and aircraft organized into Carrier Strike Groups, Amphibious Readiness Groups, and
Surface Action Groups have traditionally operated collectively to project power, maintain
freedom of the seas, and further U.S. interests in military and foreign policy. Tactics and
doctrine have been established and practiced over time with respect to the construct of
distributed forces that function as a cohesive fighting force, but continuous improvement
in emerging adversary technologies and platforms challenge this ability to conduct
operations in littoral environments.
A. BACKGROUND
As described in the National Defense Strategy, the U.S. has become accustomed
to “dominant superiority in every operating domain. We could generally deploy our
forces when we wanted, assemble them where we wanted, and operate how we wanted.
Today, every domain is contested-air, land, sea, space, and cyberspace” (Mattis 2018, 3).
In the current strategic environment, the assumption that the attainment of sea control is
easily achievable by the world’s most powerful Navy is now regularly questioned by
capable adversaries. Sea control in this sense is defined as “winning fleet battles in blue
water against a first class-opponent” (Hughes 1999, 10). The U.S. has not engaged in major
naval fleet combat since World War II; therefore, it is difficult to discern if the current and
future U.S. Navy is capable of achieving this description of control of the sea in any specific
region.
A report produced by the Center for Strategic and Budgetary Studies titled
Maritime Competition in a Mature Precision-Strike Regime supports this idea, which
concludes that since the last major naval engagement for the U.S. “advances in maritime
capabilities have been dramatic. Yet the data on the relative value of these new capabilities
are meager, culled from minor conflicts that may stimulate as many false conclusions as
1
useful insights” (Krepinevich 2014, 3). Without tangible data from modern engagements
between present-day and projected future naval powers, the research and modeling of these
capabilities becomes exceedingly valuable in forecasting the potential outcomes of battles
against increasingly capable opponents.
With respect to gaining sea control, challenges from competitors are prevalent and
widespread, especially when attempting to access specific global regions via the maritime
domain. U.S. forces conducting operations in open seas are regularly tested by major
regional powers such as the Chinese forces in the Western Pacific, Iranian presence in the
Middle East region, and Russian forces in the Baltic and Mediterranean. Additionally, the
proliferation of progressive combat technologies exacerbates the threat faced by U.S.
operational forces. Potential state and non-state adversaries now have access to
increasingly precise and lethal munitions, and modern surveillance technology enables
enemy assets to locate and engage targets more proficiently and effectively.
B. TASKING STATEMENT
The Chair of the Systems Engineering Analysis (SEA) curriculum details the
project assignment for the SEA Cohort 27 Capstone via a tasking letter. The memorandum
describing the tasking of the integrated project was provided to the SEA-27 team under the
guidance of the Office of the Chief of Naval Operations Director of Warfare Integration,
OPNAV N9I.
2
Design a cost effective and resilient unmanned and manned system of
systems capable of contributing to Distributed Maritime Operations concept
in the 2030-2035 timeframe. Focus your design’s contributions on counter-
targeting, decoys, deception, electromagnetic warfare and the manned-
unmanned tactics associated with them to achieve desired effects in
supporting tactical offensive operations in the air, surface, undersea and
cyber domains. Consider employment requirements, power requirements,
operating areas, bandwidth and connectivity, interoperability, sensor data
processing, transfer and accessibility, logistics, forward arming and
refueling (FARPS) basing support in forward areas from CONUS bases.
Where possible, include joint contributions in the systems of systems.
Generate system requirements for platforms, sensors, active decoy
packages, manning, communication and network connectivity, and their
operational employment concepts. Address the costs and effectiveness of
your alternatives in mission areas like at-sea strike and electromagnetic
warfare. (Kline 2017, Tab A)
C. PROBLEM STATEMENT
Further direction on research topic areas is provided via the supplementary problem
statement, derived from the SEA-26 and SEA-27 teams’ involvement in the 2017
Consortium for Robotics and Unmanned Systems Education and Research (CRUSER)
Warfare Innovation Continuum Workshop. Members of the SEA teams contributed to the
DMO concept research with respect to combined, joint, and coalition warfare at-sea by
leveraging operational military experience and current scientific advancements from
civilian engineers across the defense and technology industries. The CRUSER Warfare
Innovation Continuum Workshop was motivated by the following problem statement:
3
operations. The larger research question is: “How might emerging
technologies; concepts; joint, combined and coalition forces contribute to
distributed maritime and cross-domain operations?” (Kline 2017, Tab B)
D. OBJECTIVE
This report details the efforts to apply DMO with the goal of improving the ability
of naval forces to function in an integrated manner when conducting operations in a
challenged, littoral environment. The Capstone team focuses efforts not on designing new
platforms or force compositions, but instead, on the employment of manned and unmanned
systems to increase combat power, specifically the use of deceptive strategies and tactics
for improved counter-targeting and tactical offensive operations. A significant area of
focus for current and future naval forces is the ability to promptly strike effectively, which
is critical to overall mission success. The ability to counter-target, or take action prior to
an adversary missile launch to prevent friendly forces from being targeted or engaged, is
also required for mission success, but is largely an evolving practice with current, advanced
technologies and demands further study. The SEA-27 group leverages academic
backgrounds and operational experience to examine the technologies and resources that
will improve the Navy’s ability to conduct integrated engagements and counter-targeting
through the employment of tactics and counter-measures. The objective of the SEA-27
team is to perform an evaluation and provide actionable recommendations regarding the
ability to perform DMO in a contested maritime setting, in support of the development of
a more lethal and survivable naval force.
E. OUTLINE
This report details the SEA-27 Capstone team’s research, modeling, and evaluation
of various systems and their respective contributions to the performance of DMO. The
organization of the report follows the sequence of events and activities the group performed
to define the tasking, identify the problem and solution spaces, develop a representative
model, and analyze the alternative force compositions in terms of the ability to perform the
fundamental principles of DMO.
The first major section of the report consists of Chapters II through V, and details
the foundational theories related to DMO. Chapter II defines DMO and the supporting
4
concepts and terminology, as well as the structure for the problem in terms of boundaries
and areas of focus. Chapter III details the context for the project with a description of the
operational scenario, environment, and order of battle for the friendly and enemy forces
engaged in a fleet-on-fleet battle. Chapter IV specifies the kill chain sequence that provides
the foundation for an operational simulation, as well as the tactics and counter-measures
considered for inclusion in the DMO construct. Chapter V details the measures and metrics
applied to the model to evaluate of the alternative force compositions and their respective
impact to DMO.
The latter half of the report describes the development and implementation of an
operational simulation to facilitate a structured analysis of varying combinations of friendly
force assets and tactics. Chapter VI describes the functionality and limitations of the
simulation, as well as the intended outputs as a function of the input variables and
associated experimental design. The discussion in Chapter VII provides the results and
analysis of the DMO force structures in terms of the previously identified measures of
effectiveness and performance. The analysis is summarized and applied in Chapter VIII,
which provides the team’s conclusions and recommendations based on the analysis of the
integrated forces’ ability to perform DMO in a contested environment.
5
THIS PAGE INTENTIONALLY LEFT BLANK
6
II. DISTRIBUTED MARITIME OPERATIONS
NWDC describes the desired end state of employing DMO as “fleet-centric fighting
power, enabled by integration, distribution and maneuver that allows simultaneous
7
employment of synchronized kinetic/non-kinetic mission execution across multiple
domains in order to fight, and win in complex contested environments” (Canfield 2017).
This view of DMO ensures the consideration of not only traditional tactics such as
integrated air and missile defense and at-sea strike, but also the incorporation of non-kinetic
tactics such as ISR, deception, and the use of unmanned systems particularly for enhanced
capabilities in offensive tactical operations.
Resilient: “System that is trusted and effective out of the box, can be used in
a wide range of contexts, is easily adapted to many others through reconfiguration and/or
replacement, and has a graceful and detectable degradation of function” (Goerger 2014,
871).
Counter-Targeting: “Actions that friendly forces take prior to enemy missile launch
that will divert enemy resources (missiles, ISR assets, etc.) away from real targets. Counter-
targeting can include operational deceptions and decoys as well as tactics” (Kline 2017).
8
Decoy: “An imitation in any sense of a person, object, or phenomenon that is
intended to deceive enemy surveillance devices or mislead enemy evaluation” (DoD
Dictionary of Military and Associated Terms 2018, 63).
The project tasking emphasizes four key domains for supporting tactical distributed
operations: air, surface, undersea and cyber. Due to the subject matter expertise and
operational familiarity of land operations for several group members, the land domain is
added as a separate entity from the surface (sea) domain. In addition to the operational
domains, five focus areas are specified for consideration in the system of systems design;
counter-targeting, decoys, deception, electromagnetic warfare, and manned–unmanned
tactics.
9
2. Platforms
To employ the concept of DMO, fleet assets or platforms are required to project
offensive capability to meet strategic and operational objectives. The specific order of
battle for friendly and enemy forces is discussed in detail in Chapter III, but in terms of
bounding the project scope for platforms that are active in the timeframe of the U.S. Navy
of 2030 to 2035, platforms in various stages of maturity are considered. The major
operational units of the Navy inventory to be incorporated into the team’s research for the
employment of DMO include aircraft carriers, surface combatants, fixed and rotary wing
manned aircraft, and legacy missile systems, as their intended service life extends into the
project timeframe. Additionally, several capabilities that are still in development or early
in maturation stages are also considered, especially in the realm of unmanned surface and
air assets. The new technologies and advances that are incorporated for study in the DMO
concept include not only physical surface and air platforms or missile systems, but also
planned future networking capability and tactics that have an impact on the ability to
conduct distributed offensive operations.
3. Technologies
In the effort to advance the Navy’s DMO concept, several developing and emerging
technologies are incorporated into the team’s research. While the development of new
technologies is not the focus for the SEA-27 team, it is imperative that the advancements
are considered for inclusion when developing a system that contributes to the innovative
DMO concept. This idea is emphasized (Curley 2012, 79) “new technology is not tactics,
but it may have a decisive effect in both altering the face of battle and affecting its
outcome.”
10
develop an integrated fire control network that incorporates all platforms and domains is a
technological necessity to employ the DMO concept, but this ability currently remains in
the stages of testing and evaluation.
4. Tactics
As noted in (Hughes 1999) technology and tactics are inherently linked. Tactics
continue to mature and improve drastically with advances in technology, especially related
to military deception, decoy counter-measures, and counter-targeting. For the scope of this
project, the SEA-27 team is considering the inclusion of tactics that utilize the most
recently developed deception platforms to include active and passive unmanned surface
and aerial systems. The following chapters will detail the tactics and counter-measures
considered, as well as their employment and integration within the currently employed and
future DMO force compositions.
To ensure that the team’s proposed DMO system of systems meets intended
strategic and operational objectives, architectures are constructed to determine what
functions the platforms and assets must be able to perform. The formulation of
architectures that describe the intended functionality of the DMO concept reinforces
the boundaries previously described with respect to domains, platforms, technologies,
and tactics.
11
Figure 1. DMO Top Level Functional Architecture
With the project focus dedicated to the employment of tactics within the DMO
concept, an additional functional decomposition is constructed to identify and categorize
the various classes of tactics that can be performed by existing and proposed future
platforms. The primary tactics considered for DMO across all domains are collected into
the following groupings: swarms of unmanned vehicles, mechanical or physical decoys
and counter-measures, management of electromagnetic emissions, and electronic jamming.
These tactics categories are further decomposed, as shown in Figure 2. These tactics and
their specific integration in to the DMO construct will be further detailed in Chapter IV of
this report.
13
THIS PAGE INTENTIONALLY LEFT BLANK
14
III. CONCEPT OF OPERATIONS
A. SCENARIO
The scenario provides context and describes the setting for the massing of friendly
and enemy military forces in preparation for conflict in the prescribed area of operations.
The SEA-27 team utilizes an adapted version of the narrative described in the “Maritime
War of 2030” framework as described in Appendix A (Kline 2018). The geo-political
situation in the year 2030 is characterized by continued tension between the United States
and the People’s Republic of China (PRC) in the South China Sea region, with PRC
continuing to construct military basing on contested islands. With the increased threat of
PRC expansionism and potential conflict, the United States maintains its routine patrols
through the region, and maintains its defense treaties with established regional partners.
The maritime war at sea in the 2030 to 2035 timeframe progresses from escalating
aggression and unlawful PRC activities in the region, to harassment of neighboring nations’
fishing vessels and the massing of PRC maritime forces in the South China Sea. The United
States acquires intelligence of the PRC objective to capture the Philippine island nation of
Palawan. The U.S. “blue” forces anticipate imminent engagement with PRC “red” forces
and are consequently conducting preparations for combat at sea, with immediate
mobilization of regional friendly assets to the South China Sea (SCS), specifically to the
northwestern edge of Palawan.
15
B. OPERATIONAL ENVIRONMENT AND TASKING
The operational tasking for the U.S. maritime forces includes the establishment of
a defensive perimeter on the western coastline of Palawan, the creation and continuous use
of a distributed tactical common operational picture and weapon system network, and the
integration of unmanned assets to enhance defensive and offensive capabilities. In order to
effectively defend friendly forces and the allied island from imminent attack, U.S. maritime
assets must apply the DMO concept through the employment of traditional warfare areas
including air and missile defense, surface warfare, and at-sea strike, as well as manned–
unmanned tactics, counter-targeting, deception operations, and electromagnetic warfare.
While the blue forces are executing a largely defensive operation in the protection of an
island from an imminent attack, the ships and aircraft are emboldened to be forward leaning
to an offensive posture, and to conduct strikes once able, as prescribed by the DMO
doctrine.
C. AREA OF OPERATIONS
As described in the scenario, the friendly assets in the western Pacific region will
deploy to the northern coastline of Palawan to provide a presence and defensive
fortification for the island. Figure 3 depicts the potential SCS area of operations for both
friendly and enemy units, which spans approximately 700,000 square miles of international
waters and territorial seas. The white outline represents the potential operating locations
for friendly and enemy maritime forces, while the yellow box outline denotes the location
of Palawan, the primary objective and location for U.S. forces.
16
Figure 3. Projected Operating Area. Adapted from Google Maps (2018).
1. Environmental Considerations
The environment in the vicinity of Palawan and throughout the SCS has the
potential to impact the ability to perform DMO, specifically with respect to weather
conditions and sea states. World Weather describes the atmosphere for the western coast
of Palawan, which for one half of the year is dry and experiences a mild climate, while the
remaining six months of the year are impacted by seasonal rains and storms. The average
wind speed and visibility vary with these seasonal climates, and can degrade the
performance of the sensors employed on the maritime platforms, as well as limit the
ability for friendly forces to conduct flight operations. The typical visibility is
approximately five miles in the immediate island region, while the dryer months (March
through May and September through November) allow for ideal operating conditions,
with increased visibility to ten miles and fewer extreme wind gusts. Additionally, in these
dryer seasons, the sea state is often more calm and predictable, which promotes an
environment of increased commercial and military maritime operations in the region
(World Weather 2018).
17
2. Regional Considerations
D. ORDER OF BATTLE
The defined scenario and concept of operations not only provides the SEA-27 team
with a regional area and tasking to consider, but also allows for the development of an
order of battle (OOB) that incorporates maritime platforms. The OOB is comprised of
surface ships, aircraft, weapons systems and sensors, for both friendly and enemy forces.
The information considered regarding the capabilities of each platform and asset is
compiled from open source databases. From the orders of battle, the team will examine
various configurations of individual and integrated platforms for inclusion in the concept
of employing DMO in the contested SCS environment. Although any actual conflict will
certainly involve joint and coalition forces, the SEA-27 team focuses specifically on the
maritime force contribution to better analyze naval tactics in this environment.
The U.S. maritime forces order of battle was derived from the U.S. assets available
within the Pacific Command (PACOM) area of responsibility (AOR). The U.S. forces
incorporated into the friendly order of battle include those on rotational deployment, as
18
well as those stationed in major force concentration bases such as Japan, Guam, Hawaii,
and San Diego. In an effort to constrain the total types and quantities of the various
platforms engaged in the conflict against adversary forces, only U.S. assets were
considered in the friendly OOB.
a. Friendly Platforms
The primary driver for the determination of friendly forces in the region is the
surface vessels, as the area of operations is a substantial distance from any major homeports
for the U.S. Navy. By defining the number and type of available surface vessels, the team
can begin to determine the associated air platforms and weapon systems that each vessel
provides. Additionally, in today’s typical force compositions, the surface vessels can be
viewed as independent deployable units, or they can be organized and assembled into
various action groups. Examples of such action groups include a Carrier Strike Group
(CSG) which consists of an aircraft carrier, air wing, and several smaller surface
combatants that provide defense and additional strike capabilities, an Expeditionary Strike
Group (ESG) or Amphibious Readiness Group (ARG) that is comprised of an amphibious
assault ship and several amphibious transports, or a Surface Action Group (SAG) that
provides multi-mission capabilities from guided missile and littoral combat platforms.
These various force compositions of CSGs, ESGs, SAGs, and additional independent units
will be available to blue force commanders for DMO in order to meet the desired
operational objectives.
As previously mentioned, the foremost influence for the determination of all blue
forces available for inclusion in DMO is the surface ships available in the region. Table 1
details the various ship types that are considered based on their projected service lives into
the 2030 timeframe, as well as their respective proximity to the intended area of operations
in the vicinity of Palawan. The vessels described below may already be deployed to the
SCS, or may be reassigned to the SCS from their previously given tasking in adjacent areas
or homeports in the Seventh and Third Fleets.
19
Table 1. Friendly Order of Battle—Surface Vessels
Medium Displacement
Sea Hunter MDUSV Unmanned
Unmanned Surface Vessel
The aircraft available in the region are then determined as a function of their parent
surface vessel. The fixed wing aircraft are assigned to squadrons in either the Carrier Air
Wing (CVW) stationed on the CVN aircraft carrier, or the Aviation Combat Element
(ACE) located on the LHA/LHD class amphibious assault ships. The rotary wing and
unmanned aircraft are deployed in squadrons or detachments to the aircraft carriers as well
as the smaller surface combatants that possess flight deck and aircraft hangar storage
capabilities. Table 2 specifies the comprehensive list of all aerial platforms to be included
in the friendly forces OOB.
20
Table 2. Friendly Order of Battle—Aircraft
Autonomous High
Altitude Long Fixed Wing MQ-9 Reaper Unmanned
Endurance
Tactical Exploited Rotary Wing TERN Unmanned
Reconnaissance Node
As presented in the surface ship and aircraft orders of battle, several unmanned
autonomous vessels are incorporated for DMO consideration. With the timeframe set to
2030 through 2035, the various unmanned aerial and surface vessels are expected to be
utilized in a wide variety of mission assignments, and can therefore be evaluated for their
impact on the DMO construct in terms of sensor performance, weapons employment, and
tactical relevance in their use as deceptive platforms or decoys.
c. Friendly Sensors
Another consideration for the order of battle in addition to the platforms that operate
in the various domains, is the sensors that enable the asset to perform the functions of
21
DMO. The sensors carried onboard a weapon system allow a surface combatant, aircraft,
or unmanned system to detect contacts in the operating area, identify and classify the
contacts in terms of mission or intent, and target hostile contacts that pose a threat to the
operations and survivability of friendly forces. Table 3 lists the primary sensors and their
parent platform from the U.S. order of battle. The use of the sensor data in the model of
the DMO concept will be discussed in further detail in later chapters of the report.
22
d. Friendly Weapons Systems
In addition to the major platforms and autonomous resources, weapons systems are
also incorporated into the friendly order of battle, with the intention of demonstrating the
offensive and defensive combat power of performing DMO. While many other weapons
and missiles exist and are in development for future use, the systems detailed in Table 4
are the principal assets that are employed in various mission sets, to include air and missile
defense, at-sea strike, and air to air combat.
Standard
RIM-66 Medium Range Surface to Air CG, DDG-51, DDG-1000
Missile-2
Standard
RIM-161 Ballistic Missile Defense CG, DDG-51, DDG-1000
Missile-3
Extended Range Surface to
Standard
RIM-174 Air, Anti-Ship Cruise Missile CG, DDG-51, DDG-1000
Missile-6
(ASCM)
CG, DDG-51, DDG-1000
LRASM AGM-158C Long Range Anti-Ship Missile
F-35, F/A-18
Maritime
MST Long Range Anti-Ship Cruise CG, DDG-51, DDG-1000
Strike
Missile
Tomahawk
Harpoon AGM/RGM- Over the Horizon Anti-Ship CG, DDG-51, LCS, F-35,
84 Missile F/A-18
Evolved Sea Sparrow - CVN, LHA/D, LPD, CG,
ESSM RIM-162 Medium Range Surface to Air DDG-51, DDG-1000,
Missile LCS
F-35, F/A-18, EA-18,
Sidewinder AIM-9 Short Range Air to Air
AH-1
F-35, F/A-18, MH-60,
Hellfire AGM-114 Short Range Air to Surface
AH-1, MQ-8, TERN
Advanced Medium Range Air F-35, F/A-18
AMRAAM AIM-120
to Air
HARM AGM-88 High Speed Anti-Radiation F-35, F/A-18
23
2. Enemy Order of Battle
While the friendly force order of battle is assembled as a function of the surface
vessels present in the region, the enemy has the “home field” advantage with respect to the
forces they are capable of providing in order to meet their objective of establishing a
military presence on Palawan. The PRC forces can be deployed from both the naval surface
vessels underway in the SCS, as well as the sea and air bases located on the mainland and
the forward operating bases on the contested reefs and island chains. Similar to the
projections used in the friendly order of battle, the enemy forces predicted to be operational
in the 2030 timeframe include those currently in use with service lives extending into the
2030s, as well as technology advances and platforms in development that are expected to
fulfill an operational role in the China Navy of 2030-2035.
a. Enemy Platforms
The enemy platforms presented are mobilized both from land and sea, with several
major PRC homeports on mainland China positioned approximately seven hundred to one
thousand nautical miles from the western coast of Palawan. Additionally, the PRC
possesses forward basing and “lily pad” capability with the construction and buildup of
military infrastructure on the contested reefs within the Spratly and Paracel island chains,
located at a range of just over 100 and 400 nautical miles from Palawan, respectively. The
mainland and island chain bases are projected to possess the capabilities to support both
surface ships and aircraft of all types, so nearly all of the planned 2030 operational PRC
naval forces are considered in the enemy order of battle.
Table 5 details the various PRC surface ship types that are considered in the
opponent order of battle. Many of the vessels listed are currently in development as the
People’s Liberation Army Navy (PLAN) undergoes a fleet buildup period, but are
projected to be in an operational status in the 2030 through 2035 time horizon. This is
supported by a statement extracted from China’s Military strategy, “the PLAN is
accelerating the modernisation of its forces for comprehensive offshore operations;
developing advanced submarines, destroyers, and frigates; creating an aircraft carrier fleet;
24
and improving integrated electronic and information systems” (State Council Information
Office of the People's Republic of China, 2015).
Not only is the PRC constructing new capabilities in the surface warfare domain,
but air warfare is also a major focus of development and modernization for the PLAN and
People’s Liberation Army Air Force (PLAAF). With the ability to provide land based
aircraft, the enemy order of battle is much larger in terms of types of air assets available.
Additionally, the aircraft carrier fleet and associated air wing is still in the development
stages for the PRC, but is expected to expand drastically over the next ten to fifteen years,
and is considered as a factor in the enemy order of battle.
25
Table 6. Enemy Order of Battle—Aircraft
Similar to the friendly order of battle, various unmanned aerial systems are
incorporated into the platforms available for employment in the scenario. The PRC has an
extensive list of unmanned aerial vehicles (UAVs) currently in development, so for the
purposes of this project, the primary asset in each major autonomous aircraft category was
considered. These unmanned aircraft are capable of providing intelligence collection,
surveillance, information sharing, and strike capabilities.
26
c. Enemy Sensors
An additional consideration for the enemy order of battle is the various sensors
inherent to each surface and air platform. The sensors employed on the ships and aircraft
are used for a wide range of purposes to include ISR, maneuvering, establishing a tactical
operating picture, and weapons deployment. The use of the sensor data in the simulation
of the fleet-on-fleet engagement will be described in additional detail in Chapter IV of this
report, but Table 7 lists the primary sensors and their parent platform from the red order
of battle.
AESA (Active
Electronic Scanned Renhai, J-15, J-16, J-16D, J-20, All Unmanned Air
Array Radar)
Over the Horizon
Renhai, Luyang, Jiangkai
Radar
Synthetic Aperture Aircraft Carrier, Renhai, Luyang,
Radar—Maritime KJ-3000, Y-8FQ, All Land-Based Missiles & Unmanned Air
Synthetic Aperture Yaogan Satellite
Radar—Space
27
d. Enemy Weapons Systems
The final element in the enemy order of battle are the weapons systems carried by
the surface ships and aircraft, as well as the land based missile sites that have the potential
to strike friendly forces in the area of operations. The various armaments listed in Table 8
are capable of both offensive strike in the air and surface warfare domains, and defense
from incoming aircraft and missile threats.
29
THIS PAGE INTENTIONALLY LEFT BLANK
30
IV. KILL CHAIN AND TACTICS
There are many different types of procedures or action chains used to conduct a
detect-to-engage (DTE) series of events for armed platforms. A targeting sequence is
typically broken down into the sub-tasks that must occur for a weapons system to
effectively engage an enemy platform or location. The primary required tasks include
detecting or finding the target, establishing a track on the targets location and movement,
communication of targeting data between the sensor and weapon system, conducting the
engagement with either kinetic or non-kinetic weapons, and evaluating the engagement to
determine follow-on actions.
The most commonly used kill chain for military applications is the F2T2EA model,
which is decomposed into the following subtasks: find, fix, track, target, engage, assess, as
detailed in Figure 4. The first half of the F2T2EA kill chain describes the role that sensors
play in the DTE process. The find task involves the initial detection of the target, fix refers
to the determination of the physical target location, and tracking ensures a consistent ability
to fix the target as it maneuvers. The second half of the kill chain then uses the information
provided by the sensors in order to conduct an engagement. Once a stable track has been
established, the sequence can progress to targeting, where calculations can be performed
31
to determine if a weapon has the capability to intercept or engage. Once an adversary
platform has been targeted, the operator may then move on to the process of engaging,
where a weapon has been selected and fired from the targeting platform or other friendly
platforms in the integrated targeting system. The final stage of the kill chain is to perform
an assessment, where results of the engagement are calculated to determine if the
employment of the kill chain and weapon was successful.
Hughes (1999, 7) states “the traditional definition of tactics is the art or science of
disposing of or maneuvering forces in relation to each other and the enemy, and of
employing them in battle.” The primary focus for the SEA-27 team with respect to the
DMO construct is the employment of various tactics and counter-measures that enable the
disruption of the enemy kill chain to either prevent, or lower the probability of a successful
enemy engagement of friendly forces. While many types of tactics and counter-measures
exist for the purpose of confusing adversary sensors and targeting systems, as previously
identified in the tactics architecture, the team determined several predominant categories
of deceptive methods to examine with respect to the platforms detailed in the orders of
battle. These categories include swarms of unmanned assets, mechanical and physical
decoys, controlled emission of electromagnetic radiation, and electronic jamming. Each of
these categories are further described to consider the functionality and employment of each
tactic type, as well as the intended impact on the FTE kill chain.
1. Swarm
35
deceitful radar cross section that provides a false surface, air, or missile contact for the
enemy to differentiate from a real blue platform. The active swarm requires larger
unmanned platforms and greater power generation in order to propagate the energy needed
to effectively mimic a surface combatant or aircraft. The passive swarm predominantly
serves as clutter for the adversary sensors, with the effectiveness of the swarm directly
proportional to the quantity of vehicles that aim to cause disorder and confusion for the red
radars and weapons systems.
For both types of swarms, active and passive, the purpose of the collective system
of unmanned vehicles in the DMO concept is to hamper the adversary’s ability to find and
target blue platforms. Whether or not the drones radiate electromagnetic energy, the aim
of deploying the vehicles is to gain the tactical advantage by overwhelming the enemy
sensors searching for and targeting friendly forces. A greater quantity of autonomous
vehicles deployed by blue platforms results in an increased number of radar and sensor
contacts that the enemy sensors must sort through and classify when conducting the find
and targeting sequence of the kill chain. The additional time required for the adversary to
detect all radar contacts and distinguish the unmanned vehicles from the larger blue
platforms may allow for blue to conduct the first strike in the engagement, or counter the
red platform earlier in the FTE sequence, increasing overall blue survivability.
Additionally, if the red platforms misidentify the autonomous vehicle as a legitimate target,
the enemy may misappropriate targeting and engagement resources on the illusory contact.
When compared with the technologically advanced swarm tactics, mechanical and
physical counter-measures are rather rudimentary and archaic as they have been employed
for decades with few notable groundbreaking improvements. That being said, mechanical
jamming, through the deployment of decoy devices can be exceptionally effective when
confusing or deceiving adversary systems. The definition of counter-measure encompasses
a wide variety of mechanisms that facilitate military deception against an enemy, and is
defined as the “form of military science that, by the employment of devices and/or
36
techniques, has as its objective the impairment of the operational effectiveness of enemy
activity” (DoD Dictionary of Military and Associated Terms 2018, 56).
Within DMO, the decoys and counter-measures serve to either create a false image
of contacts, deceive sensors by creating saturation or clutter tracks, and/or distract
surveillance and tracking systems from detecting, targeting, and engaging a friendly asset.
The counter-measures are classified in terms of their respective objectives or the sensor in
which they are intended to deceive. Mechanical and physical decoys are typically
categorized as defensive tactics or soft-kill options that reduce the probability of intercept
for a weapon in the terminal phases of guidance.
The first category of physical decoys and tactics that are employed to obscure or
confuse visual systems and the personnel that operate the imaging systems are visual
counter-measures. Examples of the decoys or tactics that prevent the detection and
targeting capability from visual instruments include deploying smokescreens; the setup of
inflatables or passive decoys that emulate the size, shape, and general appearance of an
actual friendly platform; and the tactical maneuver of vessels, aircraft, and personnel to
deceive enemy forces. Visual smoke can be deployed from any vessel, aircraft, or even
unmanned vehicles, and creates a barrier between enemy sensors or ISR platforms and the
assets in the vicinity of the deployed smoke screen. The obscurant serves as a cloak to mask
movements of forces, and prevent the enemy equipped with visual and imagery systems
from detecting or targeting a friendly platform. Inflatables and passive decoys can also be
37
launched or dispensed from any platform, with the objective of deceiving enemy scouting
systems through the misidentification of a decoy as the actual opponent platform.
Additionally, a substantial quantity of passive decoys can saturate and create excessive
clutter for enemy systems.
The primary sensor for detection and targeting for the majority of combat capable
platforms is radar. There are a number of radar counter-measures available that are
typically employed by units for close-in self-defense. One of the most common radar
counter-measures is chaff, or clusters of metal strips that are projected away from a targeted
platform in an effort to seduce or distract an inbound missile. The metal pieces are
dispersed into a cloud of radar clutter from a canister that is deployed from a launcher on
the parent vessel, and serve as the soft-kill option for preventing a radar-guided missile
from striking the friendly ship or aircraft. Another type of counter-measure that has the
objective of deceiving radars and radar-guided missiles are active decoys such as Nulka,
or similar devices that imitate the radar cross section of the targeted platform. These
counter-measures can currently be deployed from surface ship platforms, but may also be
developed for integration onto aircraft and unmanned platforms.
38
offensive strike weapons is diminished if any pylons or hard points are dedicated to these
defensive counter-measures.
3. Electronic Jamming
The first and simplest form of electronic attack is spot jamming, in which a system
that outputs the jamming signal generates power to propagate a signal of a distinct, singular
frequency. Spot jamming is a form of noise jamming, which is designed to increase the
noise or inherent signal clutter created by the transmitting system (air combat command
training support squadron Electronic Warfare Fundamentals 2000). By contributing
additional noise to the system, the radar is less able to distinguish actual contacts in the
noise prominent environment, therefore allowing actual contacts to go undetected. This
spot jamming technique is effective against communication systems or radars that emit
energy of a single frequency, so long as the jammer signal and associated noise is stronger
in terms of power and bandwidth, than the victim radar output and received signals.
40
(2) Barrage Jamming
The final EW tactic considered is GPS jamming, which intends to disrupt the
operation of navigation and targeting systems that rely on the satellite based GPS radio-
frequency network for location and tracking services. GPS operates on two primary
frequencies, and can therefore be blocked or jammed using instruments that produce radio
waves that create substantial interference for these operating bands. While GPS is rarely
used as a sole source for targeting information, missile guidance often times requires inputs
from a GPS system, and therefore the interference with these signals has the potential to
reduce the probability of hit for an enemy weapon system.
Depending on the friendly forces’ timing for executing the jamming of adversary
radar and communications systems, the electronic attack tactics have the potential to
degrade the adversary sensors and weapons during any phase of the FTE kill chain. By
jamming enemy air and surface search radars, the blue aircraft may be able to conduct
scouting at longer ranges, and ships may be able to maneuver undetected to avoid targeting
from enemy systems. The electromagnetic interference caused by jamming has the
potential to reduce susceptibility to attack from enemy threats, and enhance the ability to
project combat power at farther ranges as friendly assets conduct offensive strike
operations rather than focusing on unit protection and collective self-defense of the entire
operating group.
42
4. Emissions Control
With the intent of deceiving enemy sensors or preventing the adversary from
ascertaining the exact location of friendly forces, various levels of EMCON are employed.
EMCON Delta is the level associated with routine operations, in which all available sensors
and equipment are in their standard configuration. There is no limitation on transmitting
radio or electromagnetic energy, and no additional measures in place to restrict acoustic
and infrared signatures or radar cross section. The most extreme level of EMCON, known
as EMCON Alpha, employs measures to reduce the electromagnetic, acoustic, heat, and
radar cross section signatures from the platform. Essentially, the ship or aircraft limits
nearly all navigation, communications, propulsion, and weapons systems to nominal levels
of external signals in order to reduce the probability of being detected. EMCON Alpha
describes the maximum level of stealth that an asset can achieve. Intermediate levels of
EMCON are employed to cause confusion by a warship or aircraft reconfiguring its
systems and physical presence to imitate a commercial or fishing vessel.
43
blue survivability, this limitation of blue capabilities also hinders friendly forces. With
instruments and equipment reconfigured to reduce susceptibility of being attacked, the
friendly platform is also unable to fully employ its sensors and weapons systems that are
restricted in operation. For example, a surface ship set in EMCON Alpha is required to
restrict the performance of its air search and fire control radar, making it difficult to detect
and classify any inbound enemy aircraft and missile threats. In order to conduct an
offensive strike or counter-engage any enemy threat, the ship must revert to EMCON Delta,
which may take several seconds, reducing the available time to engage as a function of
sensor and weapon system range and capability.
While there are obvious advantages to employing EMCON on friendly vessels with
the objective of increasing survivability, these restrictive settings also incur a tradeoff with
reduced offensive and counter-engagement capabilities. The limiting of the propagation of
electromagnetic energy hinders the friendly forces’ ability to sense, communicate, target
and engage. A restrictive EMCON setting makes the conducting of flight operations for
surface vessels challenging, impedes usual communications and networking capacities
between friendly platforms, and causes a delay or increased time required to conduct
synchronized command and control operations. For purposes specific to DMO, the inability
44
to radiate while in an EMCON condition impedes the detection and engagement of threats
via active means, which is essential to obtain a targeting solution and launch guided
missiles to intercept the threat.
The tactics and counter-measures described are incorporated into the simulation
and analysis of DMO as applied to a fleet on fleet engagement. The following section will
describe how the implementation of the tactics impact the kill chain, and relate to the
performance of DMO. Measures of performance and effectiveness are determined for the
DMO construct, with consideration to the friendly and enemy forces that survive the
conflict, as well as the effect of the various swarm, decoys, jamming, and EMCON
techniques to degrade the ability for red threats to execute the phases of the kill chain to
target and prosecute friendly assets.
45
THIS PAGE INTENTIONALLY LEFT BLANK
46
V. MEASURES OF EFFECTIVENESS AND PERFORMANCE
To evaluate the proposed system that aims to contribute to the friendly forces’
ability to perform DMO, an assessment can be conducted with respect to the performance
of the platforms and efficacy of the tactics within the DMO construct. The metrics
established to determine the level of successful DMO employment are the Measures of
Effectiveness (MOEs) and Measures of Performance (MOPs). These quantifiable measures
allow the team to conduct an analysis of the numerous systems and force compositions,
and determine which of the alternatives best achieves the defined goals and requirements.
A. MEASURES OF EFFECTIVENESS
MOEs serve to measure the extent to which a system accomplishes the overall
mission. For this project, the MOEs are reflective of the ability to perform distributed,
tactical offensive operations in a contested environment. The SEA-27 team has established
four principal MOEs that are used to evaluate the ability for a configuration of friendly
platforms to accomplish the task of employing tactics across all domains in support of
conducting offensive and defensive engagements of attacking adversary threats.
The first and most fundamental measure for assessing overall mission success is
the ability for friendly forces to survive the war-at-sea. In order to be able to employ tactics
and counter-engage the inbound red threats, the friendly order of battle needs to remain
present throughout the simulation. As described in Fleet Tactics and Coastal Combat,
“success is measured in ship casualties and a comparison of the numbers put out of action
on both sides” (Hughes 1999, 8). This metric is described mathematically as the ratio of
remaining blue forces upon conclusion of the engagement to the quantity of friendly
platforms that entered the simulation.
47
2. MOE 2: Remaining Red Threats
An additional simple, yet essential measure of success for friendly forces is the
percentage of adversary threats that are eliminated during the engagement. In naval warfare
when considering the operational objectives, ships and aircraft eliminated from the fight
typically serve as the primary metric for success or failure, as supported by the statement
from Hughes (1999, 9), “When fleets meet in battle it is force-on-force, and enemy
warships incapacitated are the aim and satisfactory measure of effectiveness.” The method
of calculating this measure is the proportion of red threats that survive the conflict to the
total quantity of red platforms that are generated in each model run.
In addition to the metrics that evaluate the number of forces that survive the
projected engagement between friendly and enemy forces, the SEA-27 team evaluates the
percentage of enemy platforms that complete the various stages of the kill chain. The
simulation of the war-at-sea scenario generates a red threat which is assigned a specific
blue platform type to find, target, and engage. With the various tactics employed by blue
assets that aim to diminish sensor performance to reduce the probability of enemy detection
and engagement, metrics can be used to gauge the value of the deceptive strategies and
counter-measures. The expression used to calculate the red threats that are successful in
their search to find their assigned blue platform is the ratio of red assets that complete the
find sequence in the simulation to the total number of red assets generated in the model.
The requirement for the red threat to successfully complete the find sequence of the
model is to successfully determine the location of the assigned blue platform via the various
sensors carried by the red threat. For example, a red surface ship may be able to detect and
find its assigned target at greater distances by employing its electronic support measures
48
(ESM) sensor and numerous onboard radars, or at shorter ranges, the surface ship personnel
may be able to exploit line-of-sight visual and electro-optical capabilities to acquire the
target.
4. MOE 4: Red Threats that Successfully Execute the Target and Engage
Sequences of the Kill Chain
The final MOE to evaluate the success or failure of a set of blue platforms and their
associated tactics is the number of enemy threats that successfully execute the complete
kill chain sequence, including the obtaining of a targeting solution and weapons
engagement against its assigned target. This metric is calculated by determining the
quantity of red threats that are able to complete the targeting and engagement stages of the
sequence as a function of either the total quantity of threats that were simulated in the run,
or the number of enemy threats that successfully found their assigned target. While many
of the tactics available to blue forces support the objective of reducing the threats’
capability to detect and find a friendly asset, there are also several counter-measures that
serve to create confusion and disruption in the targeting and engaging phases, including
active electronic jamming as well as the limiting of electromagnetic radiation from the
targeted blue platform.
For a red threat to be considered as a platform that completes the targeting stage
and conducts an engagement, a fire control solution must be established and a weapon must
be capable of reaching the assigned friendly platform at a specified range. For example,
while an adversary surface ship may be able to detect a blue aircraft at an extended range,
if the enemy warship does not have the capability to engage the friendly aircraft due to fire
control radar limitations or an inadequate weapon engagement range, the red threat has not
successfully completed the targeting sequence. Conversely, even if the enemy platform is
within firing solution range of the assigned blue asset, but has not adequately detected and
49
located the target during the find phase, then the red threat again has not reached the
completion of the targeting phase of the kill chain.
In the engagement phase of the kill chain, the blue assets do not possess any
counter-measures or the ability to employ tactics that specifically interrupt the engagement
phase once a firing solution has been obtained by the adversary threat, but instead are able
to conduct counter-engagements to neutralize the adversary prior to a weapons launch. The
counter-measures and deceptive tactics are instead employed only after a weapon is
launched from the red platform. Additionally, this metric does not consider whether or not
the enemy missile actually intercepts or mission kills the blue asset, as that data is
considered in MOE #1, or the number of surviving blue forces.
B. MEASURES OF PERFORMANCE
The effectiveness measures serve to measure overall mission success, and measures
of performance (MOPs) assess the sub-tasks of the tactical DMO mission. The MOPs
provide supporting data to evaluate the effectiveness measures for the scenario of
performing distributed operations in a contested environment. For the team’s model, the
following data can be captured and assessed to support the evaluation of the primary
metrics for the friendly assets’ ability to perform DMO against the multi-domain capable
adversary forces.
1. Area of Uncertainty
The first MOP calculated from the simulation is the area of uncertainty, or AOU.
This metric is associated with the red threats’ ability to search and detect its assigned blue
asset. The AOU is calculated as an expanding area of increasing radius from the platform’s
actual location based on the blue platforms average speed and the tactics employed. The
blue forces’ objective is to create as large of an AOU as possible by increasing the time for
the enemy threat to find the friendly platform.
Various tactics can be activated by blue forces to degrade the adversary’s ability to
detect and ascertain the location of the blue force platform. Emissions control, electronic
jamming, physical decoys, and unmanned swarms are the primary tactics that impact the
50
AOU size. By creating additional clutter or contacts for the red threat to differentiate the
actual assigned target from the neutral traffic and additional platforms that serve as
distractions, the AOU grows larger with the increased time the red threat consumes
attempting to find its assigned blue platform. Additionally, the limiting of radiation
emissions from a blue platform reduces the probability of being detected by an ESM sensor
at extended ranges, and electronic jamming of the threat radars aims to prevent the red
threat from obtaining a clear radar fix on the blue asset. The goal for employing any of the
counter-measures or tactics is to increase the AOU, which may ultimately have an impact
on the MOEs of surviving friendly forces and/or the reduction of the quantity of red
platforms that successfully execute various stages of the FTE kill chain
In support of the MOEs detailing the number of surviving friendly forces and the
red threats that complete the engagement sequence, a potentially insightful MOP is the
ability for the blue platforms to counter-engage or divert the incoming missiles from the
red threats. The blue assets possess various hard-kill and soft-kill options to prevent an
inbound missile from striking the blue assets as a function of the range from the friendly
asset to the inbound missile. Traditional anti-air and missile defense methods can be
employed such as defensive missile intercepts, as well as counter-measures and tactics
including mechanical and physical decoys. The team aims to capture the quantity of soft-
kill decoys employed including chaff and smoke in an effort to determine which counter-
engagement methods are most effective at preventing an inbound missile from collision
with a friendly asset.
Additionally, with the primary focus of DMO geared towards the ability to conduct
tactical offensive operations, the team will determine the percentage of missiles and
counter-measures that friendly forces employed in a defensive manner as opposed to an
offensive strike. The missiles employed in a defensive manner are those categorized by
counter-engaging an enemy inbound missile, while the weapons used in an offensive
posture are those that are used to target the platforms that serve as the source of the missile.
For example, if a red threat aircraft enters the targeting sequence, a blue asset is capable of
51
conducting an offensive strike if the threat is within weapons engagement range. If the
friendly platform conducts an engagement to neutralize the red aircraft prior to enemy
missile launch, the missiles are employed offensively. If the enemy aircraft obtains a
targeting solution and fires missiles at the assigned blue platform, then the counter-
engaging missiles are employed in a defensive capacity. The comparison of the two metrics
will provide insight into the ability for the friendly force to enforce a more forward leaning
DMO doctrine.
Similar to the AOU performance measure with relation to the probability of the red
threats ability to locate the friendly forces is the evaluation of the time that each red threat
devotes to the detection and find activities in the kill chain. The metric is calculated as a
function of the start time of the simulation and the starting position of the red platform. As
time elapses, the enemy threat maneuvers and searches for the blue asset it has been
assigned. With the blue employment of DMO and the associated tactics that aim to degrade
sensor performance, the red threat may take an extensive amount of time to locate and
classify the assigned ship or aircraft.
The additional time in the find portion of the kill chain allows the closure distance
to decrease between friendly and enemy systems, potentially giving the advantage to blue
forces who can conduct a counter-engagement when a red threat is within the engagement
zone of friendly weapons systems. The team also hopes to address the question, “is
additional time spent in the find sequence advantageous to blue forces in actuality, or does
it allow for the red threat to close the distance to the assigned blue platform before
engaging, providing friendly forces with less time to conduct a counter-engagement?”
Another time delay based MOP details the time that a red air or surface threat
spends in the targeting sequence. The adversary land-based missiles do not progress
through the targeting sequence, as once a missile finds its assigned target, it transitions to
the engagement phase where it advances to its inherent terminal guidance mode. Once the
adversary platform is able to successfully locate the blue surface vessel or aircraft that it
52
has been assigned, the threat transitions to the targeting phase. In the targeting portion of
the kill chain, the red platform must employ its fire control systems to prepare to conduct
an engagement. The primary method of delaying a red platform in the sequence of targeting
activities is to prevent or diminish the ability to obtain the fire control solution through the
application of electronic jamming, reduction of the platforms heat signature, and governing
the emanation of electromagnetic radiation.
The output data and associated MOEs and MOPs provide a method of
quantitatively examining the impact of employing tactics and counter-measures associated
with the objective of performing DMO. The friendly force assets are capable of employing
emissions control, electronic jamming, swarms, and/or mechanical-physical decoys in an
effort to establish a forward-leaning offensive posture, and prevent the adversary forces
from conducting an engagement against significant elements in the blue force order of
battle. In Chapter VII of this report, various data analysis and statistical techniques are
applied to determine the effectiveness of individual tactics and combinations of counter-
measures with respect to the survivability of friendly forces, as well as the desired increase
in offensive firepower and lethality.
53
THIS PAGE INTENTIONALLY LEFT BLANK
54
VI. DMO MODEL AND SIMULATION
55
engagement of an enemy ship. The DES employed by the SEA-27 team aims to facilitate
the analysis of tactical offensive and defensive capabilities projected from either a baseline
traditional force structure or an innovative DMO force composition, as well as the
associated deceptive tactics and counter-measures.
1. Model Structure
The structure of the model is governed by the process or sequence of activities that
the items must progress through, from the initialization of the model to the conclusion of a
given run within the simulation. Each run within the simulation represents a new
replication of the battle between friendly and enemy forces. At the initialization of every
run, each red threat is assigned a friendly force asset to target and engage. In order to do
so, the series of events that the enemy threats execute are the primary functions of the
detect-to-engage kill chain. The items that conduct this sequence of activities are the enemy
order of battle platforms, including the PLAN surface vessels, aircraft, and land-based
missile systems. The adversary threats are simulated to progress through the find, target,
and engage phases of the kill chain against an assigned friendly asset. The red threats aim
to complete the entirety of the sequence to engage and destroy the blue forces, while the
friendly assets employ offensive and defensive measures to prevent potential losses. The
model explores the ability for various arrangements of U.S. forces to employ offensive
tactics and deceptive counter-measures to divert or prevent the enemy from completing the
kill chain sequence.
a. Threat Generation
The initial stage of the simulation is the generation of the adversary aircraft, surface
vessels, and land-based missile systems. The types and quantities of the enemy platforms
in the model remain constant throughout all runs of the simulation, and are further detailed
in Appendix D. While the fundamental red order of battle is essentially constant with
respect to the platforms generated, several attributes or characteristics of each of the threats
vary upon the creation of the platform within the model. Once an enemy threat is generated,
it is attributed with a set of sensors and weapons systems along with the associated
56
operating and engagement ranges, as well as the speed of advance. These attributes
contribute to the performance of the enemy threat in later stages of the model.
58
capabilities cannot possibly engage the CVN, so these platforms will have a probability of
zero for a targeting assignment to the friendly force aircraft carrier.
The second criterion evaluated is the level of reach, which considers both
operational range, as well as the maximum range of sensors, network capability, and
weapons. An example of a high value unit according to this criteria is the E-2 Airborne
Early Warning (AEW) aircraft, which has no intrinsic strike capability and a limited
operational range, but much more robust network and sensor integration capability.
Appendix F details the criteria intervals for both combat power and level of reach, and the
resulting scores for each of the blue assets. With the primary mission of DMO being the
ability to amplify offensive firepower, a higher weighting for the prioritization of enemy
targeting is given to combat power at 65%, while level of reach contributes to 35% of the
overall score.
Additionally, the enemy platform is solely assigned a blue asset category for
engagement rather than one specific platform. For example, a single PLAN J-15 fighter
aircraft may receive the assignment to find, target, and engage a U.S. guided-missile
cruiser, or CG. This assignment does not correspond to a specific cruiser in the model, but
instead applies to any CG. There may be anywhere from zero to five cruisers in the friendly
forces order of battle as a function of the quantity generated, so the J-15 fighter can attack
any CG in the simulation. Additionally, the J-15 may be assigned the CG, along with an
enemy surface combatant who is also assigned to prosecute the friendly CGs. The enemy
surface combatant could potentially target and destroy the CG prior to the arrival of the J-
15, but the J-15 in the model is not capable of determining if the CG has been successfully
mission killed, so it will still continue to target and engage the already damaged friendly
cruiser. In the event that there are no cruisers generated for friendly forces, the J-15 reenters
the pairing sequence to receive a new assignment to a different platform type. The mission
assignment sequence allows for dissimilar categorical pairings, (enemy surface ship to
friendly aircraft, enemy missile to friendly surface ship, etc.) as well as unequal quantities
such as a single J-15 fighter having to find and target a single cruiser out of the three
cruisers in the vicinity of Palawan.
The final scenario in which an adversary platform may require a new targeting
objective is the frustration reassignment, or when an enemy threat is unsuccessful in
finding the assigned friendly platform due to sensor incompatibility or failure. The
targeting assignment for an adversary to locate the friendly forces assigned aircraft,
warship, or land-based missile is provided at the start of the simulation, but the threat can
60
potentially be reassigned during the run if a platform allocates greater than 75 percent of
its allowable time to find the assigned asset and is unsuccessful. This maximum allowable
time is a function of the starting separation distance between the threat and the assigned
blue force asset, as well as the speed of advance for the enemy platform or missile. An
example of this reassignment is a PLAN Z-18 helicopter with an operating speed of 120
knots assigned to target a friendly force MDUSV at a range of one hundred and eighty
miles. The maximum allowable time for the Z-18 to find and target the MDUSV is one-
and-a-half hours based on the range separation and speed. If the Z-18 dedicates greater than
approximately an hour and ten minutes or transits more than 100 and 35 miles towards the
asset without finding the MDUSV, the Z-18 can request a reassignment to a different
friendly force asset. In this case, the threat is essentially requesting a new assignment which
may be denied, or could result in a new assignment to a different targetable asset.
c. Environmental Considerations
The concluding element of the initialization sequence for the group of enemy
threats is the determination of environmental factors including weather and clutter. These
attributes influence the threats sensor performance, resulting in either an enhanced or
degraded capability of finding and targeting the assigned friendly platform. The first
component of the environmental factors is weather. For the model, the various
meteorological conditions are simplified to 3 conditions and given a probability of
occurrence. For the majority of the simulation runs in which weather is not a factor, the
cloud cover and rains are negligible, and therefore there is no degradation to sensor
performance for both friendly and enemy forces. In the occasional event of storms or
reduced visibility, a degradation factor of 10 percent is applied to detection systems
including radars, as well as infrared, visual, and electronic support measure sensors. The
final, and least frequent, weather condition considered in the vicinity of Palawan is severe
weather that degrades sensor performance by 30 percent. Appendix C details the
probability of each weather condition as well as the associated degradation to the systems
used for detection of the assigned friendly platforms. The weather condition and
degradation factors simultaneously impact all platforms in the simulation, and remain
constant throughout the duration of the run.
61
The generation of clutter in the model contributes to the overall quantity of air and
surface contacts in the simulation. Clutter includes neutral commercial and shipping traffic
through the air and sea lanes in the region. The presence of the neutral vessels provides
additional contacts for the enemy platforms to differentiate from targetable threats when
conducting the find and targeting phases of the kill chain. The model represents clutter
through the creation of approximately 55 to 75 additional contacts in the operating area,
determined as a function of typical congestion of merchant vessels and aircraft in the local
region. The average quantity of sea and air traffic in the vicinity of Palawan is determined
from the annual average of Automatic Identification System (AIS) tracks that travel
through the prescribed area of operations during a 3-hour time interval (Marine Vessel
Traffic 2018).
Upon generating the complete enemy order of battle, assigning all enemy threats to
friendly platforms for targeting, and setting the environmental conditions, the engagement
simulation begins with each threat at the start of the kill chain. The model clock now
progresses forward from time 0, as each adversary aircraft, surface ship, and land-based
missile proceeds toward the location of the U.S. forces at its attributed speed. Each
individual threat attempts to find its assigned target by employing its onboard sensors. If a
threat is able to find its assigned friendly platform, the enemy combatant or missile
advances to the targeting phase, and with the acquisition of a firing solution, ultimately the
threat is able to engage the blue asset. Each phase of the enemy’s kill chain consists of a
variety of activities or events that dictate the platform’s performance with respect to the
ability to find, target, and engage. Additionally, the modeled activities within each phase
incorporate the ability for friendly forces to employ DMO offensive counter-engagements
as well as counter-targeting and tactics to divert or prevent the adversary from conducting
a successful engagement. Figure 7 depicts the fundamental functionality and sequence of
the model, with further detail and annotations of the ExtendSim event based simulation
shown in Appendix H.
62
Figure 7. Primary Functions of the DMO Model
(1) Finding
The initial phase of the kill chain consists of a sequence of activities for an enemy
threat to detect and locate the friendly force target that it has been assigned. The ability for
the adversary to find the assigned platform type is a function of the sensors carried by the
searching platform, the maximum range of the sensors, and the relative performance of that
sensor in finding the blue asset. The probability of find values represent the single-look
chance of successful detection specific to an individual enemy sensor and the friendly
platform the sensor is attempting to locate. The enemy platform employs its appropriate
sensors to conduct a single-look scan of the operational area in an attempt to find the
assigned friendly force asset. This process of sensor single-look, independent scans to find
the assigned blue target is iterated many times as the enemy platform progresses inbound
toward the friendly forces’ location.
With each sensor scan, clutter is also considered as the need to differentiate neutral
and friendly traffic from a targetable rival platform. The ability to reduce clutter by a certain
quantity for each scan is dependent on the performance of a specific sensor. An advanced
radar may be able to instantaneously categorize a large group of contacts as neutral traffic
63
with each look, resulting in a significant reduction in clutter and a higher probability of
find, while an optical or infrared sensor requires several seconds per an individual contact
to distinguish the platform as a legitimate target or neutral traffic. An adversary surface
combatant equipped with advanced high power radars can perform rapid scans of the
operating area, so even with high clutter saturation and a full friendly order of battle to
include swarm and decoys, the enemy ship can typically perform enough independent scans
to decipher and classify all contacts, resulting in an overall high probability of finding the
assigned friendly force platform.
The range gates implemented for each sensor type ensure that a friendly asset
located at a distance greater than the operational range of a radar or other available
detection methods cannot be found successfully. For example, a small missile boat with
only a short-range surface search radar cannot locate a friendly force aircraft at a range of
several hundred miles because the associated probability of finding an aircraft with the
surface search radar at this range is 0. There may also be instances where a targetable
platform is within range of an enemy sensor, but due to weather conditions or clutter or
employed counter-measures, the probability of find may be reduced to a level in which the
enemy is unable to detect the assigned friendly asset on a single look.
Additionally, sensor fusion, or the ability for a platform to use multiple onboard
sensors to find is accomplished by applying a calculation that considers the probability of
find for all sensors that are able to be employed for a certain range. An example of the
sensor fusion can be explained as an adversary fighter J-16 aircraft assigned to target a
friendly force littoral combat ship (LCS). The J-16 may be able achieve an initial detection
at a range of eighty miles using the AESA radar, but due to clutter or other contacts in the
area, the J-16 has not successfully identified all targets and determined the exact location
of the LCS target. As the J-16 continues to progress inbound towards the location of the
LCS, in addition to the AESA radar, the aircraft’s surface search radar can also be
employed to assist in the finding of the blue force surface combatant. With multiple sensors
in range of the assigned target, the probability of find for both independent radars are
considered, increasing the overall probability of the J-16 finding the friendly LCS.
64
Throughout the simulation, an adversary platform only attempts to detect and locate
the friendly force platform type that it has been assigned. There is no benefit or penalty
applied to either force for an enemy combatant detecting an asset of a different platform
type. A PLAN aircraft, such as the bomber H-6K, could be assigned to target the LHA
amphibious ship, and in its efforts to locate the LHD/LHA(s), the H-6K conducts an
overflight of an entire carrier strike group without conducting an engagement because the
threat aircraft is not assigned any element of the strike group. By not allowing the enemy
platforms to engage friendly targets of opportunity, this artificially skews the attrition rates
to benefit blue forces. However, the relative impact of the employment of tactics remain
unaffected by the modeling limitations of preventing enemy threats from targeting and
firing upon the first available blue asset. Furthermore, it is assumed that each enemy
platform is independent in its kill chain efforts, meaning that the H-6K that overflew the
strike group does not communicate the information to any other platforms in the
simulation. Each aircraft, warship, or missile threat continues its attempts to find the
assigned friendly asset until either the run time expires, the threat is unable to reach the
assigned platform due to range and speed, or the friendly asset is successfully found by the
enemy, resulting in the transition to the targeting stage of the kill chain.
65
friendly force platform, the DDG-1000 platform has the advantage due to separation
distance and employment of deceptive tactics. The opposite may be also true for a given
run, in which the separation distance is not nearly as great and the enemy has several
sensors within range to successfully locate the stealth destroyer. With the PRC warship’s
successful find of the assigned DDG-1000, the enemy combatant can advance to the
targeting stage of the kill chain.
(2) Targeting
Only an adversary aircraft, surface ship, or land-based missile that has successfully
found the friendly force platform it was assigned can advance to the targeting stage. In the
targeting phase, there are additional conditions that an enemy platform must meet in order
to obtain a firing solution and conduct an engagement. Each platform that advances to the
targeting stage essentially has to conduct similar activities to those encountered in the find
stage. This is described as the enemy threat starts the targeting phase without any feasible
targeting data or a firing solution, and has to use the platform’s employable sensors with
associated probabilities of targeting in order to build up to obtaining a target solution
through numerous scans of the operating area. Additionally, even if a radar that is able to
generate a firing solution is employed to successfully find a targetable platform, a new
probability of target value is applied in this phase, which considers not only the radar’s
sensor capability, but also the ability of the weapon system to obtain a feasible firing
solution. Several red force threats employ sensors that can be used to find the assigned blue
platform, but cannot be applied to generate a firing solution. The systems that may assist
in finding a friendly force asset but require a secondary targeting capability include ESM,
navigational radar, and visual sensors. An example of this restriction may be a small
surface combatant that can detect and classify a target using a surface search radar, but
requires the integration of a fire control radar to successfully complete the targeting phase
of the sequence.
66
passes the assigned blue asset, or until the threat is counter-engaged by friendly forces.
Only a threat that successfully obtains a viable targeting solution can proceed to the final
phase of the kill chain to conduct an engagement. Success in the targeting stage only
considers the platform’s capability for achieving a firing solution from the onboard sensors
and fire control systems, and does not reflect the available weapon engagement range. For
example, a J-16 aircraft may employ the AESA radar to obtain a firing solution against a
blue threat at a range of over one hundred miles, but the aircraft is restricted by only
carrying short-range missiles onboard to conduct a physical engagement. The J-16 platform
will advance to the engagement phase due to the success in obtaining a targeting solution,
even though an engagement will not be effective until the separation distance is reduced to
the maximum weapon range.
An example of a red threat that may reach the targeting phase is the DF-26 anti-
ship ballistic missile which has been assigned to neutralize the friendly forces aircraft
carrier. Using the launcher’s radar capability and guidance communications linked to the
in-flight missile, the DF-26 may have successfully located a CVN, and transitioned to the
target phase. Based on the operating condition of the CVN and/or counter-measures
employed by the targeted platform and supporting friendly assets, the DF-26’s probability
of target may or may not be degraded for each scan, resulting in either an engagement of
the CVN, or a diversion of the inbound ballistic missile threat through kinetic or non-
kinetic means.
(3) Engaging
The final phase of the kill chain is the series of events that represent an engagement
from an enemy platform against its assigned blue force asset. Once an adversary obtains a
firing solution, the platform is advanced to the engagement phase where an ordnance
launch occurs or the land-based missiles reach their terminal guidance phase against the
assigned friendly force asset. In this phase of the FTE chain, the enemy surface and air
platform-based missiles launched from the parent threat enter the simulation as separate
entities. The starting range of the enemy platform-launched missiles is the launch point
from the parent aircraft or surface vessel, and is assigned the same target as the launching
67
platform. The missiles launched are generated and prescribed similar attributes as the
parent platforms, to include an independent speed of advance, terminal guidance type, and
probability of hit against a specific friendly platform. The threat missiles can be counter-
targeted in this phase by the counter-measures and tactics available to friendly forces. For
example, a YJ-83 anti-ship cruise missile launched from an enemy surface or air platform
is terminally guided by active radar homing, and therefore could potentially be countered
by hard-kill methods as well as diverted through the use of active decoys, electronic
jamming, or physical counter-measures such as chaff. The parent platform that
conducted the engagement with the launch of missiles towards a friendly asset, then turns
outbound to increase the separation distance to attempt to prevent being counter-engaged
by friendly forces. The parent platform or land-based missile remains in the engagement
phase until the entirety of available weapons is expended, the combatant or missile passes
the assigned targeted platform, the run expires due to time, or the threat is counter-engaged
by friendly forces.
While the operational scenario describes the U.S. forces’ objective as defending an
allied nation from friendly attack, and the model is created from the viewpoint of adversary
forces conducting an attack on the U.S. assets, DMO focuses primarily on the shared
projection of offensive firepower. Therefore, incorporating the ability for blue forces to
conduct strikes from a forward leaning posture is critical to the evaluation of the DMO
capability. The portrayal of an offensive stance is accomplished through the ability to
conduct engagements of threats prior to the establishing of a targeting solution. Once an
enemy surface or air platform successfully finds its assigned blue asset and reaches the
targeting phase of the kill chain, any of the platforms in the friendly order of battle with
combat capability can conduct a strike to engage the red combatants.
68
employment prior to enemy missile launch, and can include the various types of electronic
jamming, deployment of a swarm or decoys, and operating in a limited emission condition.
For both offensive engagements (prior to an enemy missile launch), and defensive
purposes (post enemy missile launch), the missile inventory available to friendly forces are
maintained within a collective resource pool. This contrasts the red order of battle in which
the missiles generated are tethered to the parent platform and are not collaboratively shared
between threats. The model represents DMO as a united network of offensive lethality and
firepower, and therefore all missiles are shared for cooperative engagements from all
launch platforms. The missiles available for friendly forces in the shared resource pool for
a given run of the model are determined as a function of the generated friendly order of
battle. For example, a single run in which a CG and several F-35 aircraft are generated will
have a greater quantity and variety of missiles in the resource pool than a run which only
contains an LCS and a P-8 patrol aircraft.
The selection of the missile to perform an engagement is based on range gates and
logic statements implemented in the model. An example scenario of this model
functionality can be explained as an enemy surface combatant that successfully finds its
assigned target, and consequently becomes a targetable platform for a friendly force
engagement due to the adversary platform switching to a targeting system to complete the
engagement. This adversary warship is located at a range of 90 miles from the location of
friendly forces, so the counter-engagement range gates in the model can be applied. The
most capable friendly force anti-ship missile at the range of ninety miles is the LRASM.
The resource pool is checked to see if any LRASMs are available for employment based
on friendly force platforms generated in the run. If there are no LRASM assets available,
the next most capable missile at the given range will be checked for quantities available.
In this scenario, the next blue force missile for employment is the SM-6 in surface mode,
which is available due to the presence of a DDG-51 in the simulation. For this specific
missile, an additional check is done for an extended range capability if an E-2 is present.
As the enemy platform continues inbound towards friendly forces, more missile types
become available for employment as the range gates open. If a suitable friendly missile is
69
available based on the platform needed to launch the attack weapon, an engagement of an
adversary threat can occur. In any event, if a friendly force platform launches a missile to
engage an adversary threat, the targeted enemy platform’s inbound progression and ability
to conduct the various stages of the kill chain is unaffected.
In the event an enemy threat is able to damage or mission kill a friendly force asset
that contributes to the shared missile inventory, the ordnance contribution of the degraded
U.S. ship, aircraft, or unmanned asset is potentially reduced. This decrease in weapons
inventory is accomplished by considering the types and quantities of missiles carried by
the affected platform, and applying a random percentage to remove a portion of the
platforms missile capacity, potentially ranging from zero missiles to the full inventory
carried by the battle damaged asset. For example, a DDG-51 class destroyer may be
engaged by an adversary aircraft and struck by an anti-ship cruise missile. If the model
registers the DDG-51 as hit, the contributions of the ship to the missile resource pool are
multiplied by a percentage factor ranging from 0 to 1, and the missiles remaining in the
pool from the damaged ship becomes the initial total minus the quantity lost due to the
percentage calculation. An example to better illustrate this case is the DDG-51 that
contributes 83 missiles to the resource pool. If the DDG-51 is struck by an enemy missile,
and the random percentage factor generated is 0.4, which corresponds to 33 missiles, the
DDG-51 now contributes only 50 missiles to the resource pool after the missile strike (83
minus 33). The random percentage factor is justified by the potential impact of a threat
missile, which may completely mission kill the destroyer, resulting in a full reduction of
the ship’s missile contributions to the friendly resource pool, or the enemy missile may
only damage the aft missile cells, resulting in a partial reduction of counter-engagement
capability.
The area of uncertainty only applies to the adversary in the finding phase who is
actively attempting to find its assigned target, and represents a geographical area around
the targeted asset that increases as a function of the friendly platforms speed as well as the
time that the blue asset goes undetected. For each unsuccessful find scan from the adversary
threat sensors, the AOU grows larger around the targeted friendly platform. The presence
of the enemy ISR platforms in a particular run directly correlates to a change in the area of
uncertainty calculations for a friendly asset. The various adversary airborne early warning
rotary and fixed wing aircraft, maritime patrol aircraft, and reconnaissance satellite are
advantageous to the enemy as the AOU for any targetable blue platform is decreased. By
diminishing the AOU, an adversary system is able to devote more detection resources to a
smaller geographical area, resulting in either a higher probability of finding the assigned
blue platform, or less time spent in the find phase of the kill chain sequence. Additionally,
for both friendly and enemy forces, the presence of the ISR platforms creates additional
clutter, or contacts that the strike assets must dedicate time and resources to detect and
classify. These ISR assets also serve as a mission assignable or targetable platform for both
forces, and contribute to the overall fleet survivability metrics.
g. Employment of Tactics
The final major component of the model’s functionality is the incorporation of the
counter-measures and tactics employable by the friendly forces. Each of the 4 major
categories of counter-targeting and deceptive tactics identified for inclusion in the DMO
evaluation are considered in the model. The tactics are implemented separately as a
function of the intended impact of applying the tactic, and where the counter-measure
influences the adversary’s kill chain.
71
(1) Swarm
The first of the DMO tactics available for employment by friendly forces is the use
of swarms of unmanned assets. Swarms serve as a counter-targeting measure, as it can be
employed prior to an enemy threat launching a missile in an effort to divert threats or
prevent the ability to target friendly forces. The primary objective of deploying a
cooperative group of remotely piloted or controlled vehicles is to create clutter for enemy
sensors, or emulate a targetable friendly forces asset. If the swarm is able to effectively
imitate a blue vessel or aircraft, the enemy resources used to perform the functions of the
kill chain are diverted from the actual targetable friendly assets, and are then dedicated to
pursuing a false contact.
The swarm capability is incorporated into the model in terms of an input variable
as well as the adversary’s mission assignment calculations. The swarm random input
provides a continuous value ranging from 0 to 1, corresponding to the effectiveness of the
swarm, or the ability to emulate a high value unit. If the swarm is present in the model,
then the mission assignment calculation is considered, in which the swarm probability of
assignment is a random value that ranges from 0 to the percentage equal to the high value
unit. The greatest level of effectiveness for a swarm of vehicles is to successfully emulate
the high value units, either the aircraft carrier in the surface domain, or the E-2 airborne
early warning aircraft in the air domain. If the swarm mission assignment probability is set
to the value of the critical friendly assets, this results in the enemy resources being equally
distributed between the actual, manned high value asset, and the false high value unit that
is comprised of numerous remotely controlled vehicles.
Tables 9, 10, and 11 detail sample calculations for the employment of swarm in the
model, in which the initial mission assignment values are considered, normalized, and
redistributed among the platforms and swarm asset. Table 9 defines the example mission
assignment probabilities with no change due to swarm not being active for a particular run
of the simulation. The following example shown in Table 10 is the other extreme, in which
a swarm is present and is determined to be extremely effective in imitating the carrier via
either radar cross section or electromagnetic emissions. For this case, the probability of an
enemy threat being assigned the swarm is equal to the value of the mission assignment
72
probability for the aircraft carrier, and the remaining percentage of assignment probabilities
are redistributed among the other targetable platforms in the simulation. The final example
depicted in Table 11 demonstrates the case in which a swarm is partially effective, or may
be successful at emulating a vessel or aircraft other than the aircraft carrier or E-2 high
value units. The aircraft carrier accounts for nearly half (45 percent) of the mission
assignment probability, and swarm is generated to represent a partial effectiveness of
emulating the carrier. The probability of mission assignment for swarm is generated
relative to the CVN, as 23 percent of possible assignment in the sample simulation, which
reduces the targeting probabilities for the other friendly force assets in the simulation due
to the normalization and redistribution of the probabilities upon consideration of the
addition of the swarm vehicles.
73
(2) Mechanical and Physical Counter-measures
For the various types of mechanical and physical decoys and tactics, each device is
considered independently, and incorporated into the specific phase of the model that is
impacted by the counter-measure. Passive and active decoys serve as counter-targeting
measures as they are employed preemptively at the start of the simulation to hinder or
prevent enemy finding and targeting of friendly forces. The decoys serve as additional
contacts or clutter for the enemy forces to have to allocate resources to classify and identify.
Chaff, flares, and the various types of smoke are implemented as defensive counter-
measures once an enemy missile is launched, rather than assets used in the counter-
targeting stages. These counter-measures are deployable upon the event of an enemy
weapons launch, and aim to divert inbound enemy missiles that have reached the terminal
guidance phase. The chaff, flares, and smoke counter-measures are applied as the final
effort to prevent an enemy threat from intercepting a friendly asset once all other hard-kill
options have been exhausted or are no longer applicable due to range restrictions.
The quantities and types of mechanical and physical decoys and counter-measures
are input variables that are determined prior to the initialization of the model. The decoys,
chaff, flares, and smoke are all continuous variables ranging from 0 to a prescribed
maximum value, and are incorporated into the model for the defense of the friendly forces
against an enemy threat in the engagement phase. These mechanical devices are not
associated with any specific platform, and are maintained in a resource pool, similarly to
the missiles available for engagements.
The controlled radiation of energy to prevent the enemy’s unobstructed use of the
electromagnetic spectrum is modeled as a counter-targeting measure, or actions taken prior
to an adversary missile engagement against friendly forces. The 5 methods of jamming
considered in the DMO model are simulated by employing degradation factors against
enemy sensors in the finding and targeting phases of the kill chain. These degradation
factors are numerical values ranging from 0 to 1, with 0 relating to complete deprivation
of the use of a sensor, and 1 corresponding to jamming having no impact on a certain
sensor. For example, employing spot jamming to interfere with a frequency agile radar will
have a lower degradation factor (value closer to 1), than barrage or DRFM jamming which
inhibits multiple operating frequencies simultaneously. The degradation factors are
determined relative to each jamming type against all threat sensors in each phase of the kill
chain, and are incorporated into the model by multiplying these values by the normal sensor
performance parameters. For example, conducting barrage jamming against an enemy Y-
8FQ aircraft radar corresponds to a degradation factor of 0.4, resulting in a 60 percent
degradation of the adversary aircraft’s sensor performance and ability to find the assigned
friendly force asset.
The application of jamming in each run of the simulation is an input variable that
is determined prior to the start of the model. Each type of jamming is either active or
inactive, with allowable values of 0 or 1 and is assumed to remain active or inactive
throughout the duration of the simulation. Multiple types of electronic jamming can be
practiced in a single run, and are considered as cumulative yet independent effects.
Jamming is initiated at the start of the simulation, and is not conducted by any specific
friendly platform. Jamming is modeled as advantageous to friendly forces as there is no
penalty or degradation to own force sensor performance or additional interference with the
75
employment of multiple jamming types. The only modeled consequence for employing
jamming is a larger ESM signature for each friendly platform, resulting in a higher
probability of find for enemy threats using an ESM suite to detect and locate assigned blue
platforms. The jamming counter-targeting tactic is assumed to impact all threat sensors in
the engagement. Additionally, perfect information is assumed for jamming, meaning that
the jamming employed is prescribed to be effective against the operating frequency of an
adversary sensor. For example, if spot jamming is employed by friendly forces, it is
assumed that the exact frequency radiated by an adversary platform is known, and able to
be effectively overpowered by the spot jamming signal.
The final tactic available for employment by friendly forces is the ability for certain
platforms to operate in a restrictive EMCON condition. In the model, only the major
missile carrier surface combatants (cruisers and destroyers), are able to fully limit their
electromagnetic radiation and operate in EMCON Alpha. The decision to limit the
employment of EMCON to only the primary missile carriers is due to the simulated impact
of EMCON for a specific platform, specifically with regard to the contributions to the
common resource pool. The advantage to employing EMCON Alpha for the friendly force
missile carriers is that the adversary sensors are not capable of finding the CG, DDG-51,
or DDG-1000 warships using the ESM sensors, and the enemy’s active radar homing
threats have a lowered probability of intercept. The tradeoff for the U.S. fleet is the
significant loss in strike capability, as a missile carrier in the restrictive EMCON posture
does not contribute any missiles to the shared resource pool, since the platform is required
to radiate in order to launch the shipboard missiles.
76
2. Model Assumptions and Limitations
One of the primary limitations of the DMO model is the run time for each
simulation. The time allocated for the engagements is approximately 3 hours, which is
determined as a function of the slowest moving platform in the enemy order of battle, and
its speed of advance to reach the location of the friendly forces. With the relatively short
run time, the model is effectively examining only the initial round of strikes against the
friendly forces providing defense of the island. In addition to the simulation run time, the
enemy order of battle remains constant for all replications of the simulation. For both of
these simplifying assumptions, only the initial wave of engagements is examined, in which
a follow on study could investigate the possibility of extending the run time and
considering the loss of major platforms during the first sequence of engagements.
For all platforms and their respective operating parameters, simplifications were
implemented with regards to sensors and networking capability. For example, friendly
forces are assumed to have a network established for shared offensive strike capabilities,
but the enemy platforms are assumed to operate independently with no shared detection or
targeting information. To counter-balance this advantage to friendly forces, the sensor
performance advantage is provided to the enemy forces. For each adversary platform, their
best inherent sensor is assumed operational and able to be employed against friendly assets.
77
An example of this implementation is a PLAN surface threat being assigned to target and
engage an F-35. The enemy surface vessel probabilities of find, target, and engage are
determined as a function of the highest performing, most capable radar against the F-35
target. The performance characteristics for the sensors are not specified to the level of
considering different variations onboard platforms of different classes. The phased array
radar is assumed to be equivalent on the Renhai class destroyer as the phased array radar
onboard the Luyang III destroyer.
With respect to staging and forward deployed operations, the model does not
consider logistics as a limiting or enabling factor for either fleet. Due to the short run time
of the simulation, it is assumed that all resources needed for maneuver and engagements
are contained within the units in the operating area, with no consideration given to the need
for refueling or rearming. Additionally, no supply ships or aircraft are incorporated into the
either belligerent’s order of battle, which would serve as targetable platforms in a realistic
engagement.
B. DESIGN OF EXPERIMENTS
78
occurs with a projected baseline or traditional force structure of 2030, which includes a
carrier strike group, an expeditionary strike group, and several independent units, as
detailed in Table 12. The input variables for the simulation, depicted in Table 13, of the
baseline force composition consists of only the various counter-measures and tactics that
can be employed by the friendly forces, as the platforms available to be generated and
paired against an enemy threat are determined prior to the start of the simulation.
79
Table 13. Baseline Force Structure Input Variables
The second event simulation of the experiment considers the employment of non-
traditional force architectures, as the discrete integer quantities of the multi-domain
platforms are varied within the model. Table 14 details the input variables for the DMO
experimental design, which includes not only the application of deceptive counter-
targeting tactics and defensive counter-measures, but also the adjustable platform
quantities. This design allows for cooperative, networked friendly assets that do not
conform to a prescribed action group structure. For example, a single run may consist of
non-traditionally grouped platforms such as a DDG-1000, EPF, EA-18s, AH-1s, an MQ-
9, and various deceptive tactics and counter-measures that must function in an integrated
manner to meet operational objectives and protect own force assets.
80
Table 14. Variable Force Structure Input Variables
Determination of the desired simulation objectives and input variables leads to the
selection of the experimental design needed to facilitate the data generation and analysis
of various DMO alternatives. With the presence of both continuous and discrete input
variables or various levels, and the potential for over several million design points to
simulate, the nearly orthogonal balanced (NOB) design is selected as an appropriate
method for the DMO simulation and analysis (Vieira et al. 2011).
The NOB process creates a space filling design that enables the consideration of
the various variable types and levels, while minimizing correlation between the input
variables. The balanced portion of the design refers to the same frequency of occurrence
for every factor of an input variable. Nearly orthogonal describes the method that ensures
the maximum absolute pairwise correlation between any two factors is less than 0.05,
81
meaning that the effect of one factor is essentially independent of the effects for another
factor. Lastly, the space filling capability refers to the creation of a representative sample
of the solution space since the examination of every possible combination of variables is
impossible due to time constraints (Vieira et al. 2011).
The NOB space filling design enables the creation of 512 design points, or
combinations of the input variables including tactics for the baseline force structure, and
platforms as well as tactics for the DMO capable force structure. A sample of these design
points is detailed in Appendix I. Figure 8 depicts a representation of the input variables for
the DMO force structure simulation to demonstrate the space filling capability of the
experimental design. The manned platform input variables can accept discrete integer
quantities, while the decoys and tactics variables shown on the scatterplot can take on a
wider range of continuous values. Additionally, the maximum absolute pairwise
comparison between the full set of input variables is 0.0299, which is within acceptable
limits for a simulation of this nature. Each of the 512 design points is replicated 30 times
to limit the impact of variability, resulting in 15,360 simulation runs for both the baseline
and DMO-centric force structures, for an overall total of 30,720 simulation runs. While
each run varies due to the changing input variables, the approximate time to run each
replication of the simulation is 10 to 30 seconds, resulting in an overall run time of nearly
16 hours.
82
Figure 8. DMO Structure Input Variable Scatterplot Matrix—First 10
Input Variables
83
THIS PAGE INTENTIONALLY LEFT BLANK
84
VII. MODEL ANALYSIS
Using the data extracted from the 30,720 total runs of the model as described in
Chapter VI.B, the team applies various statistical analysis methods to determine the impact
of the various platforms, unmanned systems, counter-measures, and tactics on the ability
to perform DMO. The model output is divided into two major groups of 15,360 runs, or
512 observations or data points with 30 replications of each individual data point. The first
set of output data corresponds to the baseline fixed force structure that considers only the
tactics and counter-measures as model input variables. The second data set refers to the
variable DMO force structure in which the tactics and friendly force platforms that can
be employed against the enemy forces in the engagement simulation are changed from
run to run.
By performing an analysis of both sets of extracted data, the team aims to gain
insights and provide evidence to support recommendations for various levels of leadership.
The baseline force structure insights are directed towards operational commanders that may
not have the ability to determine or allocate the specific forces for employment, but can
alter the tactics in order to increase the survivability and lethality of the forces available at
the time of the engagement. The analysis conducted on the modifiable DMO force structure
enables recommendations that provide insight for the echelons of leadership that are
capable of making force architecture recommendations and assignments, as the simulation
considers various groupings of platforms, assets, and tactics, for employment in the fleet-
on-fleet engagement.
In order to develop these insights from the model outputs, the data captured by the
simulation allows for the calculating of the measures of performance and effectiveness as
described in Chapter V, as well as several additional metrics that provide further fidelity
into the overall performance of the friendly forces participating in the engagement. Table
15 details the parameters captured by the model, which are further detailed in the equations
shown in Appendix E.
85
Table 15. Metrics Captured by the ExtendSim Model
86
These metrics are captured, calculated, and analyzed to determine the input
variables that have the largest impact on each metric through regression analysis. A
statistical analysis program, JMP, is used to assist in the regression analysis and
determination of significant factors and relationships between variables with respect to the
ability of the friendly force assets to perform DMO. In an effort to create models that
appropriately fit the data generated from the model, both the individual input variables are
considered in the regression, as well as the first order interactions between variables.
Additionally, the regression is performed in a stepwise manner through the application of
the Bayesian Information Criterion (BIC) algorithm. The BIC method produces a
parsimonious model by considering the singular input variables and impactful interactions
between input variables that have an impact on the respective dependent variable or output
being examined (Schwarz 1978, 461). The execution of the BIC procedure for the
regression analysis assists in the determination of the statistically significant variables that
have an impact on the ability to perform DMO.
Not all of the captured data and associated metrics proved to be insightful, and may
not be addressed in the following analysis sections. The determination of the insightful
metrics as compared to those that did not provide any substantial value during the analysis
was accomplished through the use of the JMP statistical software tool, and the selection of
a significance criteria. For the following analysis, only the input variables and interactions
that present a p-value of less than 0.01 are considered as statistically significant factors.
The analysis of the baseline force structure considers only tactics and counter-
measures as input variables, as the force composition is fixed and remains constant for all
15,360 runs of the simulation. As described in Chapter VI, the variable tactics include the
five various types of jamming, employment of swarm assets, mechanical and physical
counter-measures, and the limiting of emissions from the primary missile carrying
platforms (CG, DDG-51, DDG-1000). These input variables and their interactions are
analyzed against the output metrics of the model including the survivability of friendly and
enemy forces, as well as the ability of the enemy threats to complete the finding and
targeting phases of the kill chain.
The survivability of the friendly forces is a metric defined as the proportion of blue
force assets that survive the engagement as compared to the quantity of friendly force
platforms that are initialized in the specific run. The overall survivability metric is difficult
to discern in terms of value due to the lack of weighting for individual platforms. For
example, due to the calculation of the MOE, the loss of an aircraft carrier in a run is
equivalent to the loss of an unmanned vehicle, as each asset is counted in the equation
solely in terms of quantity, rather than total value. While an aircraft carrier would be a
much more devastating loss to friendly forces than an MDUSV or TERN asset, this is not
accounted for in this metric, and therefore the metric is more valuable in terms of sub-
metrics of categorized platform groupings. The decomposition of overall survivability
88
MOE into several sub-metrics of categorical platform groupings provides additional insight
into the ability for certain platforms to persist through the engagement against enemy
forces. The team examines the survivability of four major groups; the complete fixed blue
force order of battle across all domains, the aircraft carriers and amphibious assault ships,
the primary missile carrier surface platforms, and the fighter aircraft (F-35, F/A-18, EA-
18). For each of these groupings of platforms, the input variables that significantly
contribute to survivability are determined.
Prior to examining the individual significance of the input variables, the first JMP
output of the regression analysis is the actual by predicted plot, as depicted in Figure 9 for
the overall survivability of the fixed OOB blue forces. The plot provides insight into the fit
of the model and the predicted response as compared to the actual model output response.
While an ideal R squared value is much closer to a value of 1, this model is acceptable for
this simulation due to the relatively low number of input variables, and the high variability
for survivability between individual runs.
89
Upon examining the fit of the model, the analysis of the individual factors and
interactions between input variables that contribute to friendly force overall survivability
is performed. Table 16 provides a summary of the insights found from the analysis of the
data outputs as created by the statistical program. For the survivability of each of the
platform groupings in the summarized table, the individual factors that are determined to
be statistically significant from the sorted parameter estimates are listed. While the
interactions between various input variables may be significant, especially for determining
the parameters needed to fit the model to the data, only the individual input variables are
listed in the summary tables. For example, the overall survivability of the baseline friendly
force structure is impacted by the statistically significant singular input variables of spot
jamming, swarm, and barrage jamming. In order to determine which of the factors may
have had a positive or negative operational impact on the survivability of the friendly forces
in the simulation, additional JMP outputs are considered including the sorted parameter
estimates and a partition tree.
90
Figure 10. MOE #1: Statistically Significant Factors—Fixed Friendly
Force Overall Survivability
Figure 10 depicts a more detailed snapshot of the input variable factors and first
order interactions that contribute to overall friendly force survivability. It is observed that
for this specific MOE, the interactions between the various types of jamming actually has
the most statistically significant impact on the survivability of the fixed blue order of battle.
In this particular analysis, a partition tree is valuable in determining the operational impact
of each of the statistically significant individual input variables with respect to the overall
survivability of friendly forces.
For example, the statistically significant factors described in Table 16 for the
subgroup of friendly force missile carriers detail the employment of swarm and barrage
jamming as having the largest potential impact on the ability for the CG and DDG
platforms to remain in the engagement throughout the duration of the simulation. Figure
12 details the parameter estimates that assist in identifying swarm and barrage jamming as
the statistically significant input variables. Again, a partition tree is created to further
examine these factors for their respective operational significance.
92
Figure 13. MOE #1: Operational Impact of Statistically Significant
Factors—Fixed Friendly Missile Carrier Survivability
From the partition trees detailed in Figure 13, the parameter estimates identified as
statistically significant are examined as independent, singular input variables. The tree on
the left details the impact of swarm on friendly missile carrier survivability. The
employment of swarm with an effectiveness of emulating the high value units is greater
than 37.4 percent, results in a four percent increase of CG and DDG platforms that remain
at the conclusion of the battle. Additionally, if swarm effectiveness is increased to nearly
ninety percent, the overall survivability of missile carriers increases again by over 4
percent, resulting in an overall 8 percent increase in CGs and DDGs remaining at the end
of the engagement simulation. This can be attributed to the mission assignment function
within the model, when swarm is more effective at deceiving the enemy as the aircraft
carrier, additional assignment probability is given to the swarm, and therefore reduced from
the missile carrier platforms. Considering the impact of only barrage jamming being
employed to impact missile carrier survivability, there is a nearly 3 percent positive
relationship between the use of barrage jamming in the battle and the ability for missile
carriers to remain operational in the battle.
93
The detailed analysis for the remaining subgroups of the high value ships and
fighter aircraft are considered in Appendix K.
A similar process of analysis is applied to the remaining MOEs for the data set that
considers the fixed baseline force structure. For this MOE, the enemy survivability is
considered as an overall force survivability, and is not decomposed into various
subgroupings of similar platforms or domain-centric assets. The data output regarding the
overall survivability of enemy forces produces a much more aptly fit model, with an R
squared value of 0.97, as depicted in the actual by predicted plot in Figure 14.
94
Figure 15. MOE #2: Statistically Significant Factors—Enemy Force
Survivability
95
Figure 16. MOE #2: Operational Impact of Statistically Significant
Factors—Fixed Force Structure Enemy Survivability
96
3. Analysis of MOE #3: Enemy Force Effectiveness in Find Sequence of
Kill Chain
In addition to the survivability metrics, the MOEs to evaluate the fixed force
structure include the percentage of enemy threats that are able to evade friendly force
counter-targeting efforts and complete the various stages of the kill chain. The first MOE
is the effectiveness of the overall enemy force in completing the find portion of the kill
chain. This metric is calculated by determining the percentage of enemy threats that
successfully find their assigned blue target.
Due to the simulation run time of approximately three hours, the enemy threats are
provided ample time to transit the operating area and successfully complete the find phase.
Additionally, friendly forces are incapable of conducting counter-engagements while a
threat is in the find sequence, therefore the only potential impact to a an enemy threat
97
conducting search is the application of tactics and the associated degradation factors. The
only instance in which a red threat could be unsuccessful during this find phase is when
the red threat sensor is substantially degraded or incompatible with the assignment
platform. This scenario is rarely an issue for the slower surface platforms, but is much
more prevalent for the significantly faster red missiles and aircraft that are capable of
closing this distance due to their attributed speed of advance. If a red threat is unsuccessful
in finding its intended blue target, the enemy platform or missile exits the model and does
not proceed to the targeting or engagement portion.
For this specific MOE, air and surface platforms are nearly guaranteed to find their
assigned asset in the simulation, and are therefore rarely impacted by any particular tactic
of counter-measure. Due to the excessive speeds on the enemy missiles, some tactics can
be employed by friendly forces to delay the finding just enough to divert or force the missile
out of the model. As depicted in the parameter estimates of the enemy missiles’ ability to
find an assigned blue force asset in Figure 17, an interaction term is deemed significant in
the regression analysis, therefore a partition tree is created to examine the operational
impact of the various, independent types of jamming.
98
Figure 18. MOE #3: Operational Impact of Statistically Significant
Factors—Enemy Missile Ability to Find the Assigned Friendly Force Asset
With respect to the enemy missiles’ ability to find an assigned friendly force asset,
spot jamming has the greatest operational impact at 11.4 percent. This value represents the
difference in the effectiveness of the enemy missile with respect to its ability to find the
assigned blue force asset, with either spot jamming on or off in the simulation. Without
spot jamming activated, the percentage of enemy missiles that are able to find the assigned
target is nearly 88 percent, while the activation of spot jamming results in an eleven percent
reduction to 76.4 percent. While this is still a relatively high percentage of successful find
for the enemy missiles, additional opportunities to counter the inbound threat occur during
99
the engagement phase with the employment of hard-kill and soft-kill counter-measures.
Additional detailed analysis for the air and surface domains considered in MOE #3 of
enemy force effectiveness in the find sequence is contained in Appendix K.
The fourth MOE for consideration in the analysis of the baseline force structure is
the effectiveness of the enemy threats in the targeting and engaging phases of the kill
sequence. This metric is calculated as a function of the quantity of enemy threats that
successfully complete the targeting phase as compared to the number of platforms that
enter the targeting phase. The enemy missiles do not enter the targeting phase, once a
missile is able to successfully find the assigned target, it automatically transitions to the
engagement portion of the kill chain. Therefore, the threat missiles are not considered in
this metric. Additionally, the adversary threats that are unsuccessful in the find phase are
not captured in this metric, as a platform cannot progress to the targeting stage until a
location is determined for the assigned blue asset. The primary differences between the
targeting percentage and the finding percentage is due to the capability of enemy sensor
performance for finding as opposed to targeting, as well as the ability for friendly force
assets to conduct an engagement against red threats that advance to the targeting phase.
Additionally, in the simulation, if the threat is able to complete the targeting sequence, a
weapons engagement of the friendly asset is conducted.
100
As captured in Table 18 from the parameter estimates from the various domains,
four of the jamming types are deemed statistically significant for the targeting sequence of
the kill chain, regardless of platform type. To determine the operational significance of
these input tactics, the partition tree for the effectiveness of enemy aircraft in the targeting
sequence is studied.
With the activation of barrage jamming as an independent tactic in the model, the
percentage of enemy aircraft that are able to successfully complete the targeting phase is
reduced by over twenty percent. This reduction in targeting capability subsequently
101
diminishes the ability for the enemy to employ their weapons systems against blue force
platforms. Barrage jamming also reduces the percentage of red surface vessels able to reach
the engagement phase by 9.4 percent. Both of these reductions can be attributed to the
impact barrage jamming has on the adversary targeting radars. By degrading these targeting
radars, barrage jamming is able to keep the red threats in the targeting phase longer, where
blue has more opportunities to counter-engage the enemy platform or missile.
The employment of spot, DRFM, or sweep jamming as independent tactics also has
a noticeable reduction in the ability for enemy aircraft to conduct targeting and
engagement. These jamming capabilities lead to scenarios in which the friendly forces are
able to successfully engage and destroy an adversary platform before threat missiles can
be launched to strike blue forces. Since jamming is modeled in a way that benefits the
adversary ESM sensors and degrades enemy radars, this result is noteworthy. It is evident
that the drawback of using jamming, as it is currently modeled, is greatly surpassed by the
benefit associated with degrading enemy radar systems.
When examining the MOPs for the fixed friendly force structure, similar general
trends are observed. This is especially true as many of the measures of performance are
capturing similar information to the metrics described in the MOEs. For example, an enemy
aircraft time to target is similar and largely correlated to the overall effectiveness for an
enemy aircraft in the targeting phase of the kill chain. With the number of input variables
limited to only the employment of tactics and counter-measures, the various types of
jamming are frequently observed to be a dominant factor for both the MOEs and related
MOPs. The correlation between the MOEs and MOPs can be observed in the scatterplot
matrix displayed in Figure 20. The six factors depicted in the scatterplot are the MOEs of
percentage of enemy threats that successfully target their assigned friendly force asset, as
well as the related MOPs of time to target for air, surface, and missile threats. Due to the
correlation between the MOEs and MOPs, along with the prevalence of jamming as the
dominant factor in each regression analysis, the analysis of the MOPs are omitted from this
section, as little additional insight is gained from the specified analysis of the area of
102
uncertainty, time to find, and time to target with respect to the three threat categories of air,
surface, and missile threats. The analyses for the fixed force structure MOPs are contained
in Appendix K. Additional MOPs are evaluated and discussed in further detail for the
analysis of the DMO variable force structure in the following section.
The second portion of the analysis considers the simulation of a variable force
structure, with not only the tactics incorporated as input variables, but also the friendly
force platforms and order of battle are generated as a function of the DOE. The tactics and
counter-measure variables remain unchanged from the first set of outputted data, but the
total quantity of input variables is increased by 23 platforms, with multiple levels per each
blue force asset, as previously described in Chapter VI. The expanded input variables list
103
for the modifiable force structure is compared to the same metrics as the first data set, with
additional analysis performed to examine not only the MOEs for the scenario, but also
several MOPs. In this data set, special attention is paid to identifying the crucial platforms
that had the largest impact on these outputs.
The first overall MOE examined for the variable force structure is the survivability
of the friendly forces. The DMO-centric force structure incorporates any combination of
manned and unmanned assets across all domains in the engagement with opposing enemy
forces. This metric is particularly useful when considering the ability to employ DMO
because it represents the platforms that can defend against attack, as well as conduct
offensive strikes against enemy threats prior to engagement. This measure also requires
more consideration in each scenario as the variability of the results is much greater due to
the wide range of orders of battle that can be generated. For example, a single run in the
simulation may have generated the 149 total threats from the enemy order of battle paired
against a nearly equivalent friendly force of major surface combatants, fighter aircraft, ISR
platforms, and unmanned assets. Another run in the same set of data may have generated
the 149 enemy threats to be paired up against a single small surface action group of LCS
and rotary wing aircraft. As noted in Table 19, there are more factors that are determined
to be significant with the analysis of the variable force structure, but additional levels of
analysis can be performed for each metric to determine the operational impact of the
statistically significant platforms and tactics in the DMO force structure.
104
Table 19. Analysis Summary of DMO Structure—Friendly Force
Survivability
For the variable DMO force structure, a regression analysis is performed for each
of the platform groupings with respect to survivability, including the overall order of battle,
high value surface ships, missile carriers, and fighter aircraft. The regression model plots
and parameter summaries are further detailed in Appendix K. The sorted parameter
estimates output for each of the groups is again used to determine the factors of statistical
significance, as summarized in Table 19.
Even with the regression analysis now considering the quantities and types of
platforms in the simulation as well as tactics, it can be observed that jamming continues to
be an apparent significant factor in the ability for friendly forces to survive the engagement.
The application of jamming to interrupt the finding and targeting sequences of the enemy
threat platforms and missiles results in fewer engagements of blue force assets.
Additionally, the DDG-51 class destroyer is consistently incorporated as a statistically
significant factor in the overall and each of the subgroups survival capability. The destroyer
is a statistically and operationally critical platform due to the average quantity generated in
each simulation which corresponds to a substantially larger quantity of missiles contributed
to the shared resource pool, as well as the ability to offensively and defensively sense,
target, and engage all enemy threat types.
105
2. Analysis of MOE #2: Survivability of Enemy Forces
An additional metric for the DMO variable force structure with respect to the ability
to perform DMO, particularly in an offensive capacity, is the enemy forces that remain at
the end of each simulation as compared to the initially generated 149 enemy entities. Table
20 summarizes the statistically significant factors that contribute to the quantity of red force
platforms and missiles that are not engaged or diverted by friendly forces.
The most statistically significant factors contributing to the MOE of enemy forces
remaining are the number of DDG-51s, CGs, and anti-air F-35 assets available, as well as
the ability to perform barrage jamming against enemy targeting sensor. The number of
DDG-51s, CGs and F-35s (Air) are statistically significant and have a notable operational
impact due to the number and types of missiles they bring to the fight. Additionally,
jamming decreases the enemy’s ability to successfully target their intended friendly force
asset, while also increasing the time that the enemy threat needs to acquire a targeting
solution. This increase in time spent in the targeting sequence allows friendly force
platforms more opportunities to successfully counter-engage, which has a significant
impact on the percentage of surviving forces. In summary, more missiles and more time to
counter-engage significantly decreases the percentage of surviving red forces.
106
The operational impact of these assets and tactics on red survivability is supported
by the sorted parameter estimates in Figure 21. An increase in the quantity of DDG-51
platforms results in approximately a 1 percent reduction in overall enemy survivability per
friendly destroyer, while each additional CG in the simulation decreases the overall enemy
survivability by nearly 2.6 percent. The biggest reduction in red force survivability is
noticed as a result of the employment of barrage jamming, with an approximate predicted
percentage decrease of 5.5 percent.
The final set of MOEs analyzed with respect to the variable force structure details
the impact of various platforms and tactics to degrade enemy sensor performance in the
finding and targeting stages of the kill chain. Table 21 details the input factors identified
as statistically significant for enemy aircraft, surface vessels, and land-based missiles in
their finding of an assigned friendly force asset.
107
Table 21. Analysis Summary of DMO Structure—Enemy Find
Effectiveness
While the regression analysis identified factors that were statistically significant
with respect to the percentage of enemy aircraft, surface assets, and land-based missiles
that find their assigned target, the data shows that these factors have limited operational
impact within the model. Both enemy air and surface assets found their targets in over 97
percent of simulation runs, indicating that while certain factors may be statistically
significant, the reduction from 99 percent success in finding the blue force to 97 percent is
operationally inconsequential. This overall insignificance of friendly force platforms and
tactics for the find phase of the kill chain is attributed to the run time of the simulation,
which grants the enemy platforms more than adequate time to transit and conduct multiple
iterative searches of the operational area for the friendly force assets.
With the platforms and tactics having minimal operational impact on the ability for
the enemy forces to find the blue force asset it is assigned, additional analysis is conducted
to determine if the same conclusion is true about the targeting phase of the kill chain. Table
22 represents the factors determined to be statistically significant for the percentage of
enemy aircraft, warships, and land-based missiles that reach the targeting portion of the
simulation and are successful in targeting their assigned friendly force asset.
108
Table 22. Analysis Summary of DMO Structure—Enemy Target
Effectiveness
This metric of targeting effectiveness is decomposed into the various platform types
to consider the individual ability of enemy aircraft, surface combatants, and land-based
missiles to successfully obtain a targeting solution and engage the assigned blue force asset.
The resulting statistically significant factors are similar to many other analyzed measures
for both the fixed and variable force structures, as the prevalence of jamming is apparent,
especially in the case of enemy surface vessels targeting an assigned asset. The sorted
parameter estimates detailed in Figure 22 depict the various types of jamming as the most
impactful tactic, with several interactions between the jamming measures also determined
to be statistically significant.
109
In order to determine the operational impact of the factors detailed in the parameter
estimates, the partition tree can serve as an additional tool to provide these insights. As
detailed in Figure 23, the ability for an enemy aircraft to successfully target the assigned
friendly asset is largely affected by the employment of barrage jamming. With barrage
jamming off in the simulation, the average proportion of enemy aircraft that are able to
successfully target the assigned friendly asset is 79 percent, but with the employment of
barrage jamming by friendly forces, this enemy aircraft targeting success rate is reduced to
61 percent. Additionally, the presence of greater than 4 DDG-51 surface combatants results
in a reduction of enemy targeting effectiveness by nearly 4 percent.
While the MOPs analyzed for the fixed force structure did not provide any specific
insight into the impact of the various tactics on the enemy kill chain, the DMO force
structure incorporates many additional input variables; and therefore, the regression
110
analysis for the various DMO MOPs facilitates the determination of several statistically
and operationally significant factors for consideration. The statistical analysis of the output
data from the DMO force structure provides many opportunities for further consideration
of tactics and platforms, which are fully detailed in Appendix K.
The primary set of MOPs considered to be insightful during the analysis of the
variable force structure is the time spent by each of the enemy force threats in the finding
and targeting sequences of the kill chain. The time dedicated to finding and targeting an
assigned friendly force asset is impacted by factors that degrade the ability for a threat to
detect and locate as well as obtain a targeting solution. These MOPs are particularly
interesting due to the tradeoff that exists for the survivability of friendly forces. While an
increase in the time spent by an enemy threat in either the find or targeting phase may force
the adversary platform out of the simulation if time expires or the separation distance is
closed prior to the obtaining of a firing solution, there is also potential for reduced
opportunities for friendly forces to engage the inbound threat if the adversary does not
reach the targeting stage until close range. Tables 23 and 24 depict the statistically
significant factors as determined by the regression analysis for both the mean time to find
for all platform types, as well as the average time to target for adversary air and surface
platforms that have successfully completed the find stage of the kill chain. The enemy land
based missiles do not progress through the targeting phase in the model, therefore this
platform type is not considered for time to target.
111
Table 24. Analysis Summary of DMO Structure—Enemy Time to
Target
The various types of jamming tend to have the greatest statistical and operational
impact, while other unmanned clutter factors such as TERN and Fire Scout are also
incorporated as potential contributing factors in the ability to find for the various platforms
of the air and surface domains. The variants of the F-35 fighter aircraft also impact the time
an adversary threat spends in the find and target stages due to both the sheer quantity of
these friendly platforms generated in each run, as well as the counter-engagement
capability carried onboard.
Figure 24 depicts the analysis conducted to gain additional fidelity into the impact
of the F-35 aircraft and TERN unmanned system with respect to an enemy aircraft’s time
to find. The initial average time for a red force aircraft in the finding stage is approximately
90 seconds. When examining the grouped output data as a function of quantities of TERN
and F-35, this mean value for time spent in the searching stage changes. The best case
scenario occurs with the maximum time to find of nearly 98 seconds, when the quantities
of TERN and F-35 platforms is greater, as this increases the clutter and additional contacts
that an enemy platform has to sort through in order to locate the assigned asset. Conversely,
the least desirable time to find for an enemy platform or missile occurs with fewer air assets
in the model. While these insights are very specific in terms of quantity of assets needed to
make a substantial impact on time in the targeting sequence, the ability to determine an
approximate number of assets needed is potentially useful for leaders charged with
determining the resources needed to be successful in a major engagement against a capable
adversary.
112
Figure 24. MOP: Operational Impact of Statistically Significant
Factors—Enemy Aircraft Time to Find
Similarly to Figure 24, the partition tree shown in Figure 25 details the analysis of
the independent tactics and platforms that can be employed to prolong the time to target
for an enemy aircraft. Jamming, the F-35 aircraft and the F/A-18 serve as the primary
factors that impact the ability for an adversary aircraft to target a friendly force vessel or
aircraft. With a mean time of nearly 13 seconds for a threat aircraft to obtain a targeting
solution upon finding the assigned asset, a delay of 10 seconds caused by jamming is
substantial.
113
Figure 25. MOP: Operational Impact of Statistically Significant
Factors—Enemy Aircraft Time to Target
C. SUMMARY OF ANALYSIS
Overall, the application of the statistical analysis software to the data sets of a fixed
force structure and a variable force composition enable the team to develop insights into
the relative performance of the platforms and tactics employed in the scenario. From each
of the model outputs represented by the MOEs and MOPs, the team identifies the most
statistically significant factors that contribute to the overall success of the friendly forces
when considering survivability, lethality, and defense of the operational units. For each of
the recognized statistically significant factors, the level of significance is captured as well
as the frequency of occurrence. For example, spot jamming has a high frequency of
114
occurrence as it is noticed as a significant factor in the majority of the regression analysis
outputs, but for most metrics spot jamming has a relatively low level of operational
significance. Another parameter or input variable is the quantity of the DDG-51 class
destroyer, which is not as frequently mentioned as a significant factor, but for the metrics
in which it appears, the tendency is for the platform to have a much higher level of
significance.
The team considers the data sets for the variable and fixed force structures
separately due the difference in input variables as the variable force structure includes the
potential for modifying the underlying major fleet platforms that comprise the majority of
the overall friendly force structure. The conclusions developed from the consideration of
the frequency of occurrence and level of significance regarding the factors that have the
greatest contributions to the success of the friendly forces in the DMO scenario are listed
in Table 25. For both the fixed and variable force structure MOEs and MOPs, spot and
barrage jamming were consistently noticed as key performance enablers in measuring
friendly force success. The jamming tactics have an evident impact due to the ability for
the tactic to degrade the adversary in the critical phases of targeting and engagement within
the kill chain. Additionally, with a minimal penalty imposed on friendly forces for
employing jamming, it is apparent that this tactic demonstrates the greatest impact on the
survivability and associated ability to conduct offensive engagements against degraded
enemy threats.
Table 25. Ranking of the Significant Factors for Fixed and Variable
Force Structures
115
THIS PAGE INTENTIONALLY LEFT BLANK
116
VIII. CONCLUSIONS AND RECOMMENDATIONS
The SEA-27 Capstone project team aimed to examine the capabilities of various
manned platforms, unmanned assets, tactics, and counter-measures in an effort to
investigate the ability for the Navy’s fleet assets to perform DMO against a capable
adversary in a contested environment. In order to gain insights into the potential force
assets of the future 2030 timeframe, the team developed an event-based model to simulate
the operation of integrated and distributed force compositions. The team considered the
performance parameters of various aircraft, surface vessels, and weapons systems along
with the ability of these platforms to employ both offensive and defensive tactics to enforce
a more forward-leaning posture during an engagement with enemy forces. With the
objective of increasing lethality and offensive firepower across all operating domains, the
model served to provide quantitative data for analysis in support of fleet level
recommendations.
A. CONCLUSIONS
From the analysis of the model outputs and the consideration of the prevalence of
the significant factors, the primary factors that contribute to the DMO concept as employed
118
in the simulation can be determined and summarized. The various jamming tactics provide
blue forces with the capability to lower the probability of being found and targeted, while
also increasing the time a threat dedicates to the targeting and engagement sequence. This
time delay results in a greater number of opportunities for counter-engagements of enemy
platforms. The targeting phase is not only critical in terms of jamming, but the ability to
delay a threat who has successfully located a friendly force asset must be achieved in order
to allow friendly forces the ability to conduct a counter-engagement or deploy defensive
counter-measures. Swarms, or clutter created by unmanned assets, is also an effective
counter-targeting measure that serves to prevent the enemy from being able to obtain a
targeting solution, especially if the collection of unmanned vehicles is capable of
successfully emulating a manned platform or high value unit. The primary operational
significance of swarm is noticed in the analysis of the survivability of the missile carriers.
Even though the swarm in the model is generated to imitate an aircraft carrier or E-2, the
redistribution of the mission assignment probabilities to the unmanned swarm reduces the
chance of a critical missile carrier being targeted and engaged by an enemy threat.
B. RECOMMENDATIONS
For the purposes of what the Navy could focus on in terms of force restructuring is
the continued development and integration of unmanned systems in the construct of carrier
strike groups, expeditionary strike groups, and surface action groups. From the analysis of
119
the variable force structure, the team identified the TERN as a significant factor for both
the measures of effectiveness and performance. Specifically, the significance became
apparent only when the model generated a quantity greater than 15-20 TERN assets. The
presence of the TERN vehicle in the simulation is represented not with respect to the
specific functionality of the TERN, but instead as a clutter-creating aerial vehicle that
provides additional targets for the adversary to sift through in order to ascertain the location
of their blue platform assignment or develop a firing solution. Additionally, the small
payload of air to surface missiles facilitates the presence of an unconventional air to surface
threat to conduct counter-engagement of enemy forces. The value of the additional
unmanned systems, such as the TERN vehicle, is to force the enemy to allocate resources
and dedicate time to identify, classify, and potentially target the unmanned vehicles,
especially if they possess combat capabilities such as jamming or the ability to employ
weapons.
Similarly, the swarm tactic was also a significant factor that used unmanned
systems. The swarm played a key role in both the fixed and variable force structure data
analysis. The result of a swarm that successfully impersonates a CVN proved to be an asset
for all friendly force platforms in the simulation as the swarm detracted from the enemy’s
ability to develop viable targeting solutions. Follow-on recommendations would be to
consider using swarm assets with deceptive radar cross sections to impersonate carriers or
destroyers, as this tactic could potentially influence red platforms to prioritize their target
selection to missile platforms more than they would the aircraft carriers. Also, utilizing
unmanned surface vessels as not only a missile sponge, but as a legitimate offensive threat
against enemy platforms could influence the outcome of the success of friendly forces.
Lastly, the team identified that the number of destroyers and cruisers that the Navy
brought to the fight significantly increased the overall survivability of the friendly forces
remaining at the end of the engagement, and decreased the percentage of enemy platforms
remaining. The missile carrier platforms serve as the primary force multipliers in the DMO
concept. This was apparent due to the number of missiles that each surface combatant
brought to the fight, even in a shared resource pool environment which facilitated the
employment of friendly offensive and defensive missile by any combat capable asset. The
120
obvious recommendation would be to increase the number of destroyers and cruisers, but
realistically, due to the financial constraints, this just is not a feasible option for the future.
Moving towards what DMO brings to the fight: allowing time for decision makers, counter-
targeting, deception, and confusing the adversary; the integration of the tactics discussed
throughout this report will provide an effective alternative vice relying solely on our missile
carriers to win the fight. The team determined that the approximately two-thirds of the
missiles fired from blue platforms were employed in a defensive capacity. The obvious
recommendation for the Navy is to move towards a more offensive, “strike first” mentality.
If the adversary is targeted and engaged before they get a chance to engage blue forces,
especially with the presence of the advanced missile technologies available to state and
non-state actors, the overall stability and presence of the force is able to be maintained.
Due to the limited timeframe to complete this Capstone project, there are many
avenues of future research that can be explored to better examine the ability to perform
tactical offensive operations in contested environments. A considerable boundary that the
SEA-27 team implemented was to focus efforts only on the traditional warfare areas
including air, surface and land warfare, while limiting the inclusion of today’s critical
domains of sub-surface, space, and cyber warfare. In the current and future environment
that relies on shared information and network connectivity, the ability to interrupt this
capability would be instrumental in winning a fleet-on-fleet engagement against a capable
adversary. Further analysis of the available innovative technologies that can be employed
on unmanned assets could be incredibly beneficial in analyzing the impact of tactical
systems employment within the DMO framework of increased offensive power and
deceptive tactics. Finally, as discussed with the limitations of the model, additional fidelity
could be applied to the tactics and counter-measures to ensure a more realistic employment
of the counter-targeting and defensive measures in the operational environment.
121
THIS PAGE IS INTENTIONALLY LEFT BLANK
122
APPENDIX A. MARITIME WAR OF 2030 SCENARIO
The scenario detailed in the following narrative is used to provide the framework
for the prescribed DMO operational scenario for the fleet-on-fleet engagement. The
narrative is adapted from the Naval Postgraduate School’s Joint Campaign Analysis
(JCA) course.
Although China’s economic growth began to slow in 2018, she continued her political,
fiscal, economic, and military expansionism. In 2030 China is the world’s first economy,
has a large and growing middle class population and consequently generates a higher
demand for oil and natural gas. Relationships between Russia and China are thriving,
underwritten by a strong energy trade. China depends on the trans-Siberian pipeline
developed after negotiations with Russia on oil purchases were signed in 2014. Further
economic ties were generated by a series of trade agreements that began in 2019.
Since 2015 the increased economic and social ties between mainland China and Taiwan,
combined with an economically (yet not necessary democratically) more liberal Chinese
central government, resulted in a 2025 non-aggression treaty between the two states with
agreements to begin discussions on unification. By 2030, although not yet under “one
government”, the Taiwan parliament has Communist party representation and the joint
government, military and economic initiatives between China and Taiwan have grown to
the point they are a de-facto Chinese economic and military federation. For example,
Taiwan has allowed China to build High Frequency Surface Wave radar stations and
passive collection systems on Taiwan with joint intelligence sharing responsibilities.
Taiwan no longer relies on military sales from the United States.
China has populated several islands terra-formed through dredging in 2015 with military
installations. For example, Fiery Cross Reef has a squadron of J-20s (fifth generation
plus) with 10 Dark Sword UCAVs, while both Fiery Reef, Gaven Reef , and Hughes Reefs
have both surface to air installations (S-500) and anti-surface cruise missile mobile sites
(advanced YJ-62s). China is now building facilities on terra-formed islands made from
the western end of the Scarborough Shoal reef, protested by the Philippines and the United
States.
Tensions remain high on the Korean Peninsula with North Korea developing greater
ballistic missile and cruise missile capabilities. The successful submarine launched
ballistic missile in 2017 was followed by a series of failures, then successes of both land
launched and sea launched ballistic missiles and well as shore to ship cruise missiles.
North Korea retains a nuclear capability.
123
Japan and the United States have strengthened their social, economic, and military ties in
response to China’s and Russia’s growing influence. The Yokosuka naval facility has
evolved to a joint JMSDF and United States Navy base with GEORGE WASHINGTON and
its air wing, three United States DDGs, eight United States LCSs, and the Japanese fleet
sharing the installation. In Sasebo, the United States Navy retains LHA-6, LPD-25 and
LSD-52 and two LCS for mine clearance and protection.
The United States also established closer ties to Singapore, stationing eight LCSs, a
squadron of P-8s and their shore support in the city-nation. In addition, the United States
now maintains logistic support bases in Diego Garcia and pre-positioned expeditionary
supplies in Subic, with joint agreements with the U.K. and Philippines respectively. These
bases can act as “rapid build-up” support bases if the host country agrees. Additionally
the Philippines have invited the United States Air Force to use Clark AFB as an
expeditionary field. It is currently used in joint training exercises. The United States Air
Force has retained Kadena AFB on Okinawa, and III MEF completed its move from
Futenma to the newly constructed land-fill air base in Henoko village.
China claimed either Vietnam, Indonesia or the Philippines were responsible. They
mobilized their South China Seas fleet and demanded restoration from all three countries
or they would “secure” their sea. One month later the Chinese sank a patrolling
Vietnamese ship using a land-based surface to surface missile launched from Woody Island
(YJ-83) in the Paracels and moved a squadron of SU-37s to Woody Island. They
announced all traffic through the South China Sea would henceforth be subject to
inspection and control by Chinese forces. They threatened to assume governorship of the
island of Natuna Besar Indonesia to control the South China Sea’s southern approaches
and in compensation for the attack on their deep sea exploration ship. The 1st Marine
Brigade at Zhanjiang, Guangdong has embarked in the South China fleet’s amphibious
flotilla (13 landing ships modernized Type 71 LPDs and Type 72II LSTH). They can be
underway in one day’s notice and intelligence indicates their objective is the occupation
of Natuna Besar.
During these events a Philippine helicopter fired on a PLAN Type 56 corvette conducing
gunnery exercises four miles from Palawan Island. In response, China also threatened
invasion of Palawan. Increased activity by the PLA’s 124th Amphibious Mechanized
Infantry Division in Guangzhou district indicates they may be readying for this operation.
124
Indonesia, Vietnam, and the Philippines have requested UN support, specifically calling
on the United States and Japan to act. In response, China has warned Japan and the
United States any interference with their enforcement policy will lead to war, with the
threat of nuclear escalation. To show their resolve, China mobilized the East Sea and
South Sea fleets and sailed at least 50 submarines from both fleets, including two SSGN on
what are assessed to be strategic deterrence patrols. They have declared a quarantine on
all military logistics support (including oil) to Okinawa and have set up ships in blocking
positions around the island to conduct MIO.
125
THIS PAGE INTENTIONALLY LEFT BLANK
126
APPENDIX B. ICOM AND CONTEXT DIAGRAMS
A. ICOM DIAGRAM
127
B. CONTEXT DIAGRAM
The context diagram serves to distinguish the system being considered from the
surrounding systems that interact and impact the central system. For the DMO concept,
several external systems affect the ability to conduct tactical offensive operations in a
contested environment. The context diagram enabled the team to discern which systems
were considered within the scope of the project as variable that can be modeled, and which
are considered external or uncontrollable when simulating the ability to perform DMO.
128
APPENDIX C. ENVIRONMENTAL CONDITIONS
A. WEATHER CONDITIONS
B. CLUTTER CONDITIONS
130
APPENDIX D. DETAILED ORDERS OF BATTLE
A. FRIENDLY FORCES
131
2. Missile Loadouts
ESSM/RAM
HARPOON
AMRAAM
HELFIRE
LRASM
HARM
SM-2
SM-3
SM-6
MST
AIM
CVN 24
LHA/LHD 24
LPD 21
CG 36 5 25 8 14 8 12
DDG-51 32 5 10 8 8 8 12
DDG-1000 10 10 6 30 12
LCS 4 21
EPF
MDUSV
F-35 (A) 2 4 4
F-35 (S) 4 2 2 2
F/A-18 (A) 2 4 4
F/A-18 (S) 4 2 2 2
EA-18 4
E-2
P-8
MH-60 4
AH-1 2 16
MQ-4
MQ-8 2
MQ-9 2
TERN 4
132
3. Missile Ranges
Standard Missile-2 60
Standard Missile-3 1000
Standard Missile-6 With E-2: 250
Without E-2: 150
Long Range Anti-Ship Missile 300
Maritime Strike Tomahawk 100
Harpoon 65
Evolved Sea Sparrow Missiles 12
Sidewinder 18
Hellfire 4
Advanced Medium Range Air to Air Missile 75
High Speed Anti-Radiation Missile 80
133
B. ENEMY FORCES
2. Sensor Ranges
134
3. Missile Loadouts
VLRAAM
CM-102
YJ-100
HQ-10
HQ-16
FN-16
PL-12
YJ-12
YJ-18
YJ-83
PL-9
Carrier 10 120
Renhai 20 50 20
Luyang 30 10 10
Jiangkai 6 18
Jiangdao 4
Houbei 6 2
LHD 10
LPD 10
LST 5
J-11 4 4
J-15(A) 2 4
J-15 (S) 4
J-16 (A) 4 6
J-16 (S) 4 6
J-16D (EW) 8
J-20 4 6
Q-5 4 4
H-6K 6 6
KJ-3000
Y-8FQ
Z-18 2
Z-8AEW 2
135
4. Missile Ranges
136
5. Platform and Missile Speeds
137
THIS PAGE INTENTIONALLY LEFT BLANK
138
APPENDIX E. METRICS EQUATIONS
This appendix presents the various calculations performed to transform the raw data
outputted from the model to the MOEs and MOPs used in the analysis of the variable and
fixed force structures.
A. MEASURES OF EFFECTIVENESS
B. MEASURES OF PERFORMANCE
Friendly Missiles
used in an
Offensive Quantity of Blue missiles targeting Red platforms
=
Capacity Quantity of total Blue missiles shot in run
(Targeting Red
Platform)
Offensive Missile Quantity of successful Blue offensive missiles
Success =
Quantity of Blue missiles targeting Red platforms
Friendly Missiles
Used in a
Defensive Quantity of Blue missiles targeting Red threat missiles
=
Capacity Quantity of total Blue missiles shot in run
(Targeting Red
Missile)
Defensive Quantity of successful Blue defensive missiles
Missile Success =
Quantity of Blue missiles targeting Red missiles
139
Defensive Quantity successful Blue defensive missiles + successful M / P countermeasures
=
Success Quantity of Blue missiles targeting red missiles + total M / P countermeasures used
Enemy Aircraft Quantity Red Aircraft that successfully find their assigned Blue platform
Successfully Find =
Quantity Red Aircraft that entered the Find Phase
Enemy Surface Quantity Red Surface Platforms that successfully find their assigned Blue platform
Successfully Find =
Quantity Red Surface Platforms that entered the Find Phase
Enemy Missiles Quantity Red Land Based Missiles that successfully find their assigned Blue platform
Successfully Find =
Quantity Red Land Based Missiles that entered the Find Phase
Enemy Aircraft Quantity Red Aircraft that successfully target their assigned Blue platform
Successfully =
Target
Quantity Red Aircraft that entered the Target Phase
Enemy Surface Quantity Red Surface Platforms that successfully target their assigned Blue platform
=
Successfully Quantity Red Surface Platforms that entered the Target Phase
Target
Enemy Missiles Quantity Red Land Based Missiles that successfully target their assigned Blue platform
=
Successfully Quantity Red Land Based Missiles that entered the Target Phase
Target
Enemy Aircraft Quantity Red Aircraft that successfully target their assigned Blue platform
Successfully =
Target (Total)
Quantity total Red Aircraft threats in simulation
Enemy Surface Quantity Red Surface Platforms that successfully target their assigned Blue platform
Successfully =
Quantity total Red Surface Platforms in simulation
Target (Total)
Enemy Missiles
Successfully
Target (Total)
Enemy Missiles
in M/P Range
(10 nmi)
Success of M/P
Countermeasures
M/P Utilization
Metrics
140
APPENDIX F. MISSION ASSIGNMENT CRITERIA AND SCORING
This appendix details the weighting or scoring of the capabilities of friendly force
vessels to facilitate a systematic method of assigning probabilities for the adversary
mission assignment to target and engage the friendly force assets.
141
B. SCORING OF FRIENDLY PLATFORMS
142
APPENDIX G. DEGRADATION FACTORS
143
THIS PAGE INTENTIONALLY LEFT BLANK
144
APPENDIX H. ANNOTATED EXTENDSIM MODEL
DESCRIPTION
145
THIS PAGE INTENTIONALLY LEFT BLANK
146
APPENDIX I. SAMPLE MODEL INPUT DATA DMO FORCE STRUCTURE—
DESIGN OF EXPERIMENTS
147
THIS PAGE INTENTIONALLY LEFT BLANK
148
APPENDIX J. SAMPLE DATA EXTRACTED FROM MODEL
149
THIS PAGE INTENTIONALLY LEFT BLANK
150
APPENDIX K. MODEL ANALYSIS OUTPUTS
151
A. FIXED FORCE STRUCTURE
152
153
154
155
156
B. DMO VARIABLE FORCE STRUCTURE
157
158
159
160
161
162
163
164
165
166
LIST OF REFERENCES
Benitez, Mike. "It’s About Time: The Pressing Need to Evolve The Kill Chain." War on
the Rocks. May 17, 2017. Accessed February 14, 2018.
https://warontherocks.com/2017/05/its-about-time-the-pressing-need-to-evolve-
the-kill-chain/.
Blanchard, Benjamin S., and W. J. Fabrycky. Systems Engineering and Analysis. Boston,
MA: Pearson, 2011.
Brailsford, Sally, Leonid Churilov, and Brian Dangerfield. Discrete-event Simulation and
System Dynamics for Management Decision Making. Chichester, West Sussex:
Wiley, 2014.
Canfield, Jason, CDR, USN. "Fleet Design." Presentation, NPS CRUSER Warfare
Innovation Continuum Workshop, Naval Postgraduate School, Monterey, CA,
September 18, 2017.
China Power Team. "How Much Trade Transits the South China Sea?" China Power
Project: Center for International & Strategic Studies. August 2, 2017. Updated
October 27, 2017. Accessed April 14, 2018. https://chinapower.csis.org/much-
trade-transits-south-china-sea/
Coffman, Mark. "CNO Visits Navy Warfare Development Command." Navy.mil. April
13, 2017. Accessed April 8, 2018.
http://www.navy.mil/submit/display.asp?story_id=99893.
Curley, Robert, ed. War at Sea and in the Air. New York: Britannica Educational Pub. in
Association with Rosen Educational Services, 2012. Accessed April 17, 2018.
Dealy, John M., and Peter C. Saucier. JMP. Computer software. Version JMP Pro 13.
Predictive Analytics Software for Scientists and Engineers. 2016. Accessed April
17, 2018.
https://www.jmp.com/en_us/software/predictive-analytics-software.html.
167
Department of Defense Dictionary of Military and Associated Terms. Joint Chiefs of
Staff, March 2018. S.v. “counter-measures, decoy.” Accessed April 6, 2018.
http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2018
-03-27-153248-110
"Explaining KPPs, KSAs, MOEs, and MOPs." Johns Hopkins Engineering for
Professionals. September 25, 2015. Accessed February 22, 2018.
https://ep.jhu.edu/about-us/news-and-media/explaining-kpps-ksas-moes-and-
mops.
Gibson, Fletcher. 2004. “Enterprises EW Module Stays Below the Radar.” USS
Enterprise. Public Affairs (blog), January 9, 2004.
http://www.navy.mil/submit/display.asp?story_id=11306
Goerger, Simon R., Azad M. Madni, and Owen J. Eslinger. "Engineered Resilient
Systems: A DoD Perspective." Procedia Computer Science-28 (2014): 865-72.
Accessed February 28, 2018. Conference on Systems Engineering Research.
Keyword: Resilient.
Greenert, Jonathan, Admiral, Chief of Naval Operations. "Kill Chain Approach." Official
Blog of Admiral Jonathan Greenert, CNO (blog), April 23, 2013. Accessed April
18, 2018. https://web.archive.org/web/20130613233413/http://cno.navy
live.dodlive.mil/2013/04/23/kill-chain-approach-4/.
Hebert, Adam J. "Compressing the Kill Chain." Air Force Magazine, March 2003, 50-54.
Accessed February 25, 2018.
http://www.airforcemag.com/MagazineArchive/Documents/2003/March
2003/0303killchain.pdf.
Hoffmann, Jan et al., “Review of Maritime Transport, 2016,” United Nations Conference
on Trade and Development, 2016.
http://unctad.org/en/PublicationsLibrary/rmt2016_en.pdf
Hughes, Wayne P., Jr. USN (Ret). Fleet Tactics and Coastal Combat. 2nd ed. Annapolis,
MD: Naval Institute Press, 1999.
168
Jane's IHS Markit. "Jane's World Navies—China." Armed Forces Organisation - Order of
Battle. Updated March 2018. Accessed April 12, 2018.
https://janes.ihs.com/Janes/Display/1322663#Order of battle.
Joint Chiefs of Staff. “Joint Publication 3-60 Joint Targeting” January 31, 2013.
Accessed February 8, 2018. https://www.justsecurity.org/wp-
content/uploads/2015/06/Joint_Chiefs-Joint_Targeting_20130131.pdf.
Joint Chiefs of Staff. 2017. Military Deception. JP 3-13.4. Washington, DC: Joint Chiefs
of Staff.
http://jfsc.ndu.edu/Portals/72/Documents/JC2IOS/Additional_Reading/1C3-JP_3-
13-4_MILDEC.pdf.
Kline, Jeffrey. 2017. “Memorandum for Systems Engineering Analysis Cohort 27 (SEA-
27)”. Official Memorandum. Monterey, CA: Naval Postgraduate School.
Kline, Jeffrey. Maritime War of 2030. Naval Postgraduate School Operations Research
Department. Joint Campaign Analysis Course. January 11, 2018. Accessed
February 6, 2018.
Lachow, Irving. "The Upside and Downside of Swarming Drones." Bulletin of Atomic
Scientists, 2017th ser., 73 (February 28, 2017): 96-101. Accessed February 27,
2018. https://www.tandfonline.com/doi/full/10.1080/00963402.2017.1290879.
"Marine Vessel Traffic." South China Sea Ship Traffic Tracker. Accessed February 23,
2018. http://www.marinevesseltraffic.com/2013/06/south-china-sea.html.
169
Pardhasaradhi, Alaparthi, and Rayala Ravi Kumar. "Signal Jamming and Its Modern
Applications." International Journal of Science and Research 2, no. 4 (April
2013). Accessed April 5, 2018.
http://www.academia.edu/4700714/Signal_Jamming_and_its_Modern_Applicatio
ns.
Romaniuk, Scott M., and Tobias Burgers. "China’s Swarms of Smart Drones Have
Enormous Military Potential." The Diplomat: Asia Defense, February 3, 2018.
Accessed March 16, 2018. https://thediplomat.com/2018/02/chinas-swarms-of-
smart-drones-have-enormous-military-potential/.
Rowden, Thomas S., VADM, Commander Naval Surface Forces. "Distributed Lethality."
Surface Force Strategy: Return to Sea Control, January 25, 2017, 8-11.
Scharre, Paul, Director, Technology and National Security Program. "Robotics on the
Battlefield Part II: The Coming Swarm." Technology and National Security
Program. October 15, 2014. Accessed February 27, 2018.
https://www.cnas.org/publications/reports/robotics-on-the-battlefield-part-ii-the-
coming-swarm.
Schwarz, Gideon. "Estimating the Dimension of a Model." The Annals of Statistics 6, no.
2 (1978): 461–64. Accessed May 3, 2018. doi:10.1214/aos/1176344136.
State Council Information Office of the People's Republic of China. "Full Text: China's
Military Strategy." Edited by Song Miou. Xinhua Net - English News China, May
05, 2015. Accessed April 16, 2018.
http://www.xinhuanet.com/english/china/2015-05/26/c_134271001.htm.
Word News & Weapons. "China 1st Type 075 LHD Amphibious Assault Ship." Thai
Military and Asian Region, October 26, 2016. Accessed March 7, 2018.
https://thaimilitaryandasianregion.wordpress.com/2016/10/27/china-1st-type-075-
lhd-amphibious-assault-ship/.
170
INITIAL DISTRIBUTION LIST
171